A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function f of their private inputs, while leaking nothing more. In a sense …
Secure function evaluation (SFE) allows two parties to jointly evaluate a publicly known function without revealing their respective inputs. SFE can be realized via well-known …
Secure Function Evaluation (SFE) has received considerable attention recently due to the massive collection and mining of personal data over the Internet, but large computational …
We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based implementation …
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists of three components: i. a verified compiler (CircGen) that translates C programs into …
T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation (SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …
R Dutra, B Mehne, J Patel - 2015 - people.eecs.berkeley.edu
ABSTRACT Secure Function Evaluation (SFE) is the problem of performing an algorithm while keeping the input, output and intermediate values hidden from curious parties. This …
BACKGROUND This invention relates to electronic transactions, and more specifically to secure function evaluation (SFE) techniques 15 that provide privacy to the parties. This …
A secure computation protocol for a function ƒ (x, y) must leak no information about inputs x, y during its execution; thus it is imperative to compute the function ƒ in a data-oblivious …