Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits

A Saleem, A Khan, F Shahid, MM Alam… - Journal of Network and …, 2018 - Elsevier
Secure function evaluation (SFE) is a cryptographic protocol that facilitates participants to
compute a function on their private inputs in such a way that privacy of their inputs is …

[PDF][PDF] Yao's garbled circuits: Recent directions and implementations

P Snyder - Literature Review, 2014 - peteresnyder.com
Secure function evaluation, or how two parties can jointly compute a function while keeping
their inputs private, is an active field in cryptography. In 1986 Andrew Yao presented a …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Two halves make a whole: Reducing data transfer in garbled circuits using half gates

S Zahur, M Rosulek, D Evans - … on the Theory and Applications of …, 2015 - Springer
The well-known classical constructions of garbled circuits use four ciphertexts per gate,
although various methods have been proposed to reduce this cost. The best previously …

[PDF][PDF] On garbled circuits and constant round secure function evaluation

SR Tate, K Xu - CoPS Lab, University of North Texas, Tech. Rep, 2003 - Citeseer
In this paper, we examine a form of garbled (or encrypted) circuit introduced by Beaver,
Micali, and Rogaway as part of their design of a constant-round secure function evaluation …

Adaptive security of practical garbling schemes

Z Jafargholi, S Oechsner - International Conference on Cryptology in India, 2020 - Springer
A garbling scheme enables one to garble a circuit C and an input x in a way that C (x) can
be evaluated, but nothing else is revealed. Since the first construction by Yao, tremendous …

Efficient secure computation with garbled circuits

Y Huang, C Shen, D Evans, J Katz, A Shelat - … Systems Security: 7th …, 2011 - Springer
Secure two-party computation enables applications in which participants compute the output
of a function that depends on their private inputs, without revealing those inputs or relying on …

Fast garbling of circuits under standard assumptions

S Gueron, Y Lindell, A Nof, B Pinkas - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Protocols for secure computation enable mutually distrustful parties to jointly compute on
their private inputs without revealing anything but the result. Over recent years, secure …

[PDF][PDF] An intermediate language for garbled circuits

W Melicher, S Zahur, D Evans - IEEE Symposium on Security and …, 2012 - academia.edu
Secure two-party computation allows two parties to evaluate a function of their private inputs
without revealing their own inputs to the other party. The garbled circuit technique …

Universal gates on garbled circuit construction

AAT Innocent, SK, G Prakash - Concurrency and Computation …, 2019 - Wiley Online Library
Efficient garbled circuit construction can lead to more practical secure computation
protocols. Garbled circuit construction has been considered as a separate goal for …