2011
DOI: 10.1007/978-3-642-25560-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Secure Computation with Garbled Circuits

Abstract: Abstract. Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to scale to realistic problems. We present a Java-based framework that uses pipelining and circuit-level optimiz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
520
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 302 publications
(522 citation statements)
references
References 49 publications
(67 reference statements)
2
520
0
Order By: Relevance
“…We remark that our proposed solutions can be modified to work with any of the existing garbled-circuit optimization techniques of [14,5,25,6,15].…”
Section: Our Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…We remark that our proposed solutions can be modified to work with any of the existing garbled-circuit optimization techniques of [14,5,25,6,15].…”
Section: Our Contributionsmentioning
confidence: 99%
“…1 The above solution can be applied to most previous 2PC protocols based on cut-and-choose to obtain their two-output variants. But, since the circuit checking is done after the circuit evaluation, the above solution falls short when combined with circuit streaming or parallelized garbling techniques [6,15].…”
Section: Our Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The past few years have seen a tremendous amount of attention devoted to making secure computation truly practical (e.g., [HEKM11,KsS12,KSS13]). With only a few exceptions [DPSZ12, DKL + 13, KSS13], however, this work has tended to focus on secure two-party computation (2PC).…”
Section: Introductionmentioning
confidence: 99%
“…With only a few exceptions [DPSZ12, DKL + 13, KSS13], however, this work has tended to focus on secure two-party computation (2PC). In the semihonest setting, a series of papers [BDNP08, HKS + 10, HEKM11,HEK12] showed that Yao's garbled circuit technique [Yao86] can yield very efficient protocols for the computation of Boolean circuits. In the malicious setting, Lindell and Pinkas [LP07] initiated use of the cut-and-choose technique, also based on Yao's garbled circuits, for constructing efficient, constant-round protocols.…”
Section: Introductionmentioning
confidence: 99%