Secure two-party computation

Known as: Secure function evaluation 
Secure two-party computation (2PC) is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1990-2017
05101519902017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2013
2013
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocols, but often concerns about… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2013
2013
We construct a very efficient protocol for constant round Two-Party Secure Function Evaluation based on general assumptions. We… (More)
Is this relevant?
2013
2013
Secure two-party computation is a rapidly emerging field of research and enables a large variety of privacy-preserving… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Traditional approaches to generic secure computation begin by representing the function f being computed as a circuit. If f… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
We optimize the communication (and, indirectly, computation) complexity of two-party secure function evaluation (SFE). We propose… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 4
Is this relevant?
2010
2010
We consider Secure Function Evaluation (SFE) in the client-server setting where the server issues a secure token to the client… (More)
  • table 2
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure twoparty computation… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure twoparty computation… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?