Back close

Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach

Publisher : Journal of Information Security Research

Campus : Bengaluru

School : School of Engineering

Department : Computer Science

Year : 2014

Abstract : Introduced by Yao in early 1980s, secure computation is being one among the major area of research interestamong cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, ormultiparty computation depending on the number of parties involved has experienced vast diversities. Research has beencarried out by exploiting specific properties of functionalities and generic approach to achieve efficient practical securecomputation protocols. This paper considers the application secure two-party computation of AES-128 for comparison of theabove two approaches. Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach (PDF Download Available). Available from: https://www.researchgate.net/publication/263008964_Secure_Two-Party_Computation_Generic_Approach_and_Exploiting_Specific_Properties_of_Functions_Approach [accessed Apr 12, 2016].

Admissions Apply Now