Efficient secure computation optimization
Abstract
References
Index Terms
- Efficient secure computation optimization
Recommendations
Automatically optimizing secure computation
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityOn the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, optimized protocols with high performance for special problems demand manual ...
Expression rewriting for optimizing secure computation
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyIn theory secure computation offers a solution for privacy in many collaborative applications. However, in practice poor efficiency of the protocols prevents their use. Hand-crafted protocols are more efficient than those implemented in compilers, but ...
Joint Encryption and Message-Efficient Secure Computation
CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in CryptologyThis paper connects two areas of recent cryptographic research: secure distributed computation, and group-oriented cryptography. We construct a probabilistic public-key encryption scheme with the following properties: - It is easy to encrypt using the ...
Comments
Information & Contributors
Information
Published In

- Program Chairs:
- Martin Franz,
- Andreas Holzer,
- Rupak Majumdar,
- Bryan Parno,
- Helmut Veith
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 65Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in