Publication Type:

Conference Paper

Source:

The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), IEEE, Bangalore, India (2014)

URL:

http://ieeexplore.ieee.org/document/6814671/

Keywords:

2PC, 2PC protocol, AES-128, Computational efficiency, cryptographic protocols, Cryptography, cryptologists, Encryption, Functions, functions approach, garbled circuits, generic approach, Logic circuits, Logic gates, Multiparty computation, oblivious transfer, Protocols, secure computation, secure computation protocols, secure two-party computation, Wires

Abstract:

Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities and generic approach to achieve efficient practical secure computation protocols. This paper compares the above two approaches for secure two-party computation of AES-128.

Cite this Research Publication

A. A. T. Innocent and Dr. K. Sangeeta Iyer, “Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach”, in The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Bangalore, India, 2014.