Garbled circuit

Known as: Yao's Garbled Circuit, Yao protocol, Yao's Protocol 
Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2016
024620022016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Yao’s garbled circuits have been extensively used in Secure Function Evaluations (SFE). Several improvements have been proposed… (More)
  • figure 2
  • table 1
Is this relevant?
2015
2015
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic three-party protocols that… (More)
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 1
Is this relevant?
2015
2015
Randomized encodings of functions can be used to replace a “complex” function f(x) by a “simpler” randomized mapping f̂(x; r… (More)
  • table 1
Is this relevant?
2014
2014
Garbled circuits offer a powerful primitive for computation on a user's personal data while keeping that data private. Despite… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2012
2012
Secure function evaluation (SFE) on mobile devices, such as smartphones, creates compelling new applications such as… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2011
2011
Available protocols for dividing encrypted numbers in a privacy preserving framework are quite onerous. Different solutions based… (More)
  • table I
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We… (More)
  • table 1
  • table 2
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new garbled circuit construction for two-party secure function evaluation (SFE). In our one-round protocol, XOR… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
We present a protocol issue that arises with the use of oblivious transfer in the malicious case of several two-party computation… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?