More efficient secure function evaluation using tiny trusted third parties

A Iliev, S Smith - 2005 - digitalcommons.dartmouth.edu
Abstract Secure Function Evaluation (SFE) problems. We assume that a really trustworthy
TTP device will have very limited protected memory and computation environment---a\emph …

A hybrid approach to secure function evaluation using SGX

JI Choi, D Tian, G Hernandez, C Patton… - Proceedings of the …, 2019 - dl.acm.org
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to
learn the output of function f of their private inputs, while leaking nothing more. In a sense …

Secure and private function evaluation with Intel SGX

S Felsen, Á Kiss, T Schneider, C Weinert - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Secure function evaluation (SFE) allows two parties to jointly evaluate a publicly known
function without revealing their respective inputs. SFE can be realized via well-known …

Secure function evaluation using an fpga overlay architecture

X Fang, S Ioannidis, M Leeser - Proceedings of the 2017 ACM/SIGDA …, 2017 - dl.acm.org
Secure Function Evaluation (SFE) has received considerable attention recently due to the
massive collection and mining of personal data over the Internet, but large computational …

Garbledcpu: a mips processor for secure computation in hardware

EM Songhori, S Zeitouni, G Dessouky… - Proceedings of the 53rd …, 2016 - dl.acm.org
We present GarbledCPU, the first framework that realizes a hardware-based general
purpose sequential processor for secure computation. Our MIPS-based implementation …

A fast and verified software stack for secure function evaluation

JB Almeida, M Barbosa, G Barthe… - Proceedings of the …, 2017 - dl.acm.org
We present a high-assurance software stack for secure function evaluation (SFE). Our stack
consists of three components: i. a verified compiler (CircGen) that translates C programs into …

[PDF][PDF] Practical Secure Function Evaluation.

T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation
(SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …

[PDF][PDF] BlindTM—a Turing machine system for secure function evaluation

R Dutra, B Mehne, J Patel - 2015 - people.eecs.berkeley.edu
ABSTRACT Secure Function Evaluation (SFE) is the problem of performing an algorithm
while keeping the input, output and intermediate values hidden from curious parties. This …

Secure function evaluation techniques for circuits containing XOR gates with applications to universal circuits

V Kolesnikov, T Schneider - US Patent 8,443,205, 2013 - Google Patents
BACKGROUND This invention relates to electronic transactions, and more specifically to
secure function evaluation (SFE) techniques 15 that provide privacy to the parties. This …

{PCF}: A Portable Circuit Format for Scalable {Two-Party} Secure Computation

B Kreuter, A Shelat, B Mood, K Butler - 22nd USENIX Security …, 2013 - usenix.org
A secure computation protocol for a function ƒ (x, y) must leak no information about inputs x,
y during its execution; thus it is imperative to compute the function ƒ in a data-oblivious …