loading

Logout succeed

Logout succeed. See you again!

ebook img

High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority PDF

pages54 Pages
release year2017
file size2.9 MB
languageEnglish

Preview High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority

High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority Jun Furukawa*, Yehuda Lindell**, Ariel Nof** and Or Weinstein** *NEC corporation, Israel **Bar-Ilan University, Israel Eurocrypt 2017 Secure Three-Party Computation with an Honest Majority š‘„ 1 š‘„ 2 š‘“(š‘„ , š‘„ , š‘„ ) 1 2 3 š‘„ 3 Secure Three-Party Computation with an Honest Majority š‘„ 1 š‘„ 2 š‘“(š‘„ , š‘„ , š‘„ ) 1 2 3 š‘„ 3 Secure Three-Party Computation with an Honest Majority š‘„ 1 š‘„ 2 š‘“(š‘„ , š‘„ , š‘„ ) 1 2 3 š‘„ 3 • Functionality is represented by a Boolean circuit • Security with abort High-Throughput Secure Three-Party Computation with an Honest Majority High-Throughput Secure Three-Party Computation with an Honest Majority š‘” š‘ š‘”š‘Žš‘Ÿš‘” f š‘” š‘’š‘›š‘‘ How much time it takes to compute a function? High-Throughput Secure Three-Party Computation with an Honest Majority š‘” š‘ š‘”š‘Žš‘Ÿš‘” f š‘” š‘’š‘›š‘‘ How much time it takes to compute a function? Latency High-Throughput Secure Three-Party Computation with an Honest Majority 1 š‘ š‘’š‘ f f f š‘” f š‘ š‘”š‘Žš‘Ÿš‘” f š‘” š‘’š‘›š‘‘ f f f f f How much time it takes to How many functions can we compute a function? compute in one sec? Latency High-Throughput Secure Three-Party Computation with an Honest Majority 1 š‘ š‘’š‘ f f f š‘” f š‘ š‘”š‘Žš‘Ÿš‘” f š‘” š‘’š‘›š‘‘ f f f f f How much time it takes to How many functions can we compute a function? compute in one sec? Latency Throughput Low Latency High-Throughput VS. Low Latency High-Throughput

See more

The list of books you might like