A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Two halves make a whole: Reducing data transfer in garbled circuits using half gates

S Zahur, M Rosulek, D Evans - … on the Theory and Applications of …, 2015 - Springer
The well-known classical constructions of garbled circuits use four ciphertexts per gate,
although various methods have been proposed to reduce this cost. The best previously …

Scalable private set intersection based on OT extension

B Pinkas, T Schneider, M Zohner - ACM Transactions on Privacy and …, 2018 - dl.acm.org
Private set intersection (PSI) allows two parties to compute the intersection of their sets
without revealing any information about items that are not in the intersection. It is one of the …

Oblivm: A programming framework for secure computation

C Liu, XS Wang, K Nayak, Y Huang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …

Efficient garbling from a fixed-key blockcipher

M Bellare, VT Hoang, S Keelveedhi… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
We advocate schemes based on fixed-key AES as the best route to highly efficient circuit-
garbling. We provide such schemes making only one AES call per garbled-gate evaluation …

A new approach to practical active-secure two-party computation

JB Nielsen, PS Nordholt, C Orlandi… - Annual Cryptology …, 2012 - Springer
We propose a new approach to practical two-party computation secure against an active
adversary. All prior practical protocols were based on Yao's garbled circuits. We use an OT …

Blind seer: A scalable private DBMS

V Pappas, F Krell, B Vo, V Kolesnikov… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Query privacy in secure DBMS is an important feature, although rarely formally considered
outside the theoretical community. Because of the high overheads of guaranteeing privacy …

Three halves make a whole? Beating the half-gates lower bound for garbled circuits

M Rosulek, L Roy - Annual International Cryptology Conference, 2021 - Springer
We describe a garbling scheme for boolean circuits, in which XOR gates are free and AND
gates require communication of 1.5 κ+ 5 1.5 κ+ 5 bits. This improves over the state-of-the-art …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …