Two-party private set intersection with an untrusted third party

PH Le, S Ranellucci, SD Gordon - … of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
We construct new protocols for two parties to securely compute on the items in their
intersection. Our protocols make use of an untrusted third party that has no input. The use of …

Faster secure two-party computation in the single-execution setting

X Wang, AJ Malozemoff, J Katz - … on the theory and applications of …, 2017 - Springer
We propose a new protocol for two-party computation, secure against malicious adversaries,
that is significantly faster than prior work in the single-execution setting (ie, non-amortized …

Maliciously secure oblivious linear function evaluation with constant overhead

S Ghosh, JB Nielsen, T Nilges - … Conference on the Theory and Application …, 2017 - Springer
In this work we consider the problem of oblivious linear function evaluation (OLE). OLE is a
special case of oblivious polynomial evaluation (OPE) and deals with the oblivious …

Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts

B Libert, T Peters, C Qian - IACR International Workshop on Public Key …, 2017 - Springer
Abstract Structure-preserving cryptography is a world where messages, signatures,
ciphertexts and public keys are entirely made of elements of a group over which a bilinear …

On cut-and-choose oblivious transfer and its variants

V Kolesnikov, R Kumaresan - International Conference on the Theory and …, 2015 - Springer
Motivated by the recent progress in improving efficiency of secure computation, we study cut-
and-choose oblivious transfer—a basic building block of state-of-the-art constant round two …

A Framework For Efficient Homomorphic Universally Composable Commitments

BM David - 2017 - pure.au.dk
Commitment schemes are a fundamental primitive in modern cryptography, serving as a
building block for a myriad of complex protocols and applications. Universally composable …