SOCI: A toolkit for secure outsourced computation on integers

B Zhao, J Yuan, X Liu, Y Wu, HH Pang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure outsourced computation is a key technique for protecting data security and privacy in
the cloud. Although fully homomorphic encryption (FHE) enables computations over …

Cryptographically secure computation

E Shen, M Varia, RK Cunningham, WK Vesey - Computer, 2015 - ieeexplore.ieee.org
Cryptographically Secure Computation Page 1 78 COMPUTER PUBLISHED BY THE IEEE
COMPUTER SOCIETY 0018- 9162/15/$31.00 © 2015 IEEE SECURITY Big data analytics …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Secure two-party computation is practical

B Pinkas, T Schneider, NP Smart… - Advances in Cryptology …, 2009 - Springer
Secure multi-party computation has been considered by the cryptographic community for a
number of years. Until recently it has been a purely theoretical area, with few …

Implementing two-party computation efficiently with security against malicious adversaries

Y Lindell, B Pinkas, NP Smart - … on Security and Cryptography for Networks, 2008 - Springer
We present an implementation of the protocol of Lindell and Pinkas for secure two-party
computation which is secure against malicious adversaries [13]. This is the first running …

Efficient and verifiable algorithms for secure outsourcing of cryptographic computations

MS Kiraz, O Uzunkol - International journal of information security, 2016 - Springer
Reducing computational cost of cryptographic computations for resource-constrained
devices is an active research area. One of the practical solutions is to securely outsource the …

Lean and fast secure multi-party computation: Minimizing communication and local computation using a helper

J Schneider - International Conference on Security and Cryptography, 2016 - scitepress.org
A client wishes to outsource computation on confidential data to a network of servers. He
does not trust a single server, but believes that multiple servers do not collude. To solve this …

Two-output secure computation with malicious adversaries

A Shelat, CH Shen - Advances in Cryptology–EUROCRYPT 2011: 30th …, 2011 - Springer
We present a method to compile Yao's two-player garbled circuit protocol into one that is
secure against malicious adversaries that relies on witness indistinguishability. Our …

Introduction to secure computation

R Cramer - Lectures on data security: modern cryptology in theory …, 1999 - Springer
The objective of this paper is to give an elementary introduction to fundamental concepts,
techniques and results of Secure Computation. Topics covered include classical results for …

[HTML][HTML] Fairness versus guaranteed output delivery in secure multiparty computation

R Cohen, Y Lindell - Journal of Cryptology, 2017 - Springer
In the setting of secure multiparty computation, a set of parties wish to compute a joint
function of their private inputs. The computation should preserve security properties such as …