2016
DOI: 10.1007/978-3-662-53890-6_32
|View full text |Cite
|
Sign up to set email alerts
|

How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…In [ZRE15] it was shown how to reduce the communication in Yao's garbled circuits to 2κ bits per AND gate and it was proven that this matches the lower bound. In [KKS16] the authors utilize the fact that AND gates in Yao's garbled circuits where one party knows the plaintext input can be garbled at lower cost to reduce the communication for specific circuits. One approach to circumvent the high cost for certain operations are mixed-protocols, which mix secure computation protocols that operate on arithmetic and Boolean circuits.…”
Section: A Efficient Secure Computationmentioning
confidence: 99%
“…In [ZRE15] it was shown how to reduce the communication in Yao's garbled circuits to 2κ bits per AND gate and it was proven that this matches the lower bound. In [KKS16] the authors utilize the fact that AND gates in Yao's garbled circuits where one party knows the plaintext input can be garbled at lower cost to reduce the communication for specific circuits. One approach to circumvent the high cost for certain operations are mixed-protocols, which mix secure computation protocols that operate on arithmetic and Boolean circuits.…”
Section: A Efficient Secure Computationmentioning
confidence: 99%
“…Bellare, Hoang and Rogaway [10] define a security model for garbling schemes that formalizes the principle of circuit garbling as a cryptographic primitive. Many recent garbling schemes were proven secure in their model, e.g., [51,33,21]. As we will also prove our proposed scheme secure using the same model, we give a brief overview.…”
Section: Security Model By Bellare Hoang and Rogawaymentioning
confidence: 93%
“…First proposed by Andrew Yao [Yao82,Yao86], secure two-party computation (2PC) comprises the techniques for joint evaluation of a function by two parties on their respective secret inputs. In recent years, there has been a promising progress over the original Yao's protocol [BMR90,NPS99,KS08a,PSSW09,KMR14,ZRE15,KKS16]. As a consequence of these improvements, secure computation techniques now have promising results.…”
Section: Related Workmentioning
confidence: 99%