• DocumentCode
    139162
  • Title

    Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach

  • Author

    Innocent, A. Anasuya Threse ; Sangeeta, K.

  • Author_Institution
    Dept. of CSE, Amrita Vishwa Vidyapeetham Univ., Bangalore, India
  • fYear
    2014
  • fDate
    17-19 Feb. 2014
  • Firstpage
    87
  • Lastpage
    91
  • Abstract
    Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities and generic approach to achieve efficient practical secure computation protocols. This paper compares the above two approaches for secure two-party computation of AES-128.
  • Keywords
    cryptographic protocols; functions; logic circuits; 2PC protocol; AES-128; cryptography; cryptologists; functions approach; garbled circuits; generic approach; multiparty computation; oblivious transfer; secure computation protocols; secure two-party computation; Computational efficiency; Encryption; Logic gates; Protocols; Wires; 2PC; garbled circuits; generic approach; oblivious transfer; secure computation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the
  • Conference_Location
    Bangalore
  • Print_ISBN
    978-1-4799-2258-1
  • Type

    conf

  • DOI
    10.1109/ICADIWT.2014.6814671
  • Filename
    6814671