Paper 2013/081
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang, Jonathan Katz, and Dave Evans
Abstract
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secure two-party computation based on the cut-and-choose paradigm. In existing instantiations of this paradigm, one party generates
Note: Minor fix in Section 4.1.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. This is a long version of a Crypto 2013 paper
- Contact author(s)
- jkatz @ cs umd edu
- History
- 2013-06-07: last of 2 revisions
- 2013-02-20: received
- See all versions
- Short URL
- https://ia.cr/2013/081
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/081, author = {Yan Huang and Jonathan Katz and Dave Evans}, title = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/081}, year = {2013}, url = {https://eprint.iacr.org/2013/081} }