Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,258,443 papers from all fields of science
Search
Sign In
Create Free Account
Secure two-party computation
Known as:
SFE
, Secure function evaluation
Secure two-party computation (2PC) is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Computationally bounded adversary
Information theory
Oblivious transfer
Secure channel
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Bandwidth-Optimized Secure Two-Party Computation of Minima
J. H. Ziegeldorf
,
Jens Hiller
,
Martin Henze
,
Hanno Wirtz
,
Klaus Wehrle
Cryptology and Network Security
2015
Corpus ID: 9487154
Secure Two-Party Computation (STC) allows two mutually untrusting parties to securely evaluate a function on their private inputs…
Expand
Review
2012
Review
2012
THE ARECIBO LEGACY FAST ALFA SURVEY: THE GALAXY POPULATION DETECTED BY ALFALFA
Shan Huang
,
M. Haynes
,
R. Giovanelli
,
J. Brinchmann
2012
Corpus ID: 51743236
Making use of H i 21 cm line measurements from the ALFALFA survey (α.40) and photometry from the Sloan Digital Sky Survey (SDSS…
Expand
2011
2011
Leakage Resilient Secure Two-Party Computation
I. Damgård
,
Carmit Hazay
,
A. Patra
IACR Cryptology ePrint Archive
2011
Corpus ID: 12247928
In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their…
Expand
2010
2010
Assisted Common Information with Applications to Secure Two-Party Computation
V. Prabhakaran
,
M. Prabhakaran
arXiv.org
2010
Corpus ID: 16293270
Secure multi-party computation is a central problem in modern cryptography. An important sub-class of this are problems of the…
Expand
2010
2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)
K. Järvinen
,
V. Kolesnikov
,
A. Sadeghi
,
T. Schneider
Towards Hardware-Intrinsic Security
2010
Corpus ID: 3081407
Secure and efficient evaluation of arbitrary functions on private inputs has been subject of cryptographic research for decades…
Expand
2006
2006
Secure two-party computation and communication
V. Kolesnikov
2006
Corpus ID: 62386127
In this dissertation, we address several issues that arise in protecting communication between parties, as well as in the area of…
Expand
2006
2006
Privacy preserving association rules mining based on secure two-party computation
Weimin Ouyang
,
Qinhua Huang
2006
Corpus ID: 62449525
Privacy-preserving data mining in distributed or grid environment is a hot research field in recent years. We focus on the…
Expand
2006
2006
Protocols for Bounded-Concurrent Secure Two-Party Computation
Yehuda Lindell
Chicago journal of theoretical computer science
2006
Corpus ID: 35993235
Until recently, most research on the topic of secure computation focused on the stand-alone model, where a single protocol…
Expand
2004
2004
A protocol of specific secure two-party computation
L. Bao
2004
Corpus ID: 63840877
The research of multi-party computation was a subject of great importance in the international cryptographic circle. Based on the…
Expand
2003
2003
Fair Secure Two-Party Computation Extended Abstract
Benny Pinkas
2003
Corpus ID: 15919611
We demonstrate a transformation of Yao's protocol for se- cure two-party computation to a fair protocol in which neither party…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE