2PC
11
Adam Groce
1
Attacks
1
CCSW
1
CCS
5
ccs
2
coroutine
2
cpp
2
Daniel Demmler
1
Daniel Masny
1
Differential Privacy
2
Elette Boyle
1
Eurocrypt
1
FHE
3
Garbled Circuit
3
Geoffroy Couteau
1
Gizem S Cetin
1
Hao Chen
3
Honest Majority
3
iDash
1
Kim Laine
5
Kristin Lauter
3
Lisa Kohl
1
Machine Learning
3
Malicious
13
Melissa Chase Peter Rindal
1
Mike Rosulek
7
MPC
4
mpc
1
Ni Trieu
1
Niv Gilboa
1
Oblivious Transfer
8
Payman Mohassel
3
Peter Rindal
1
Peter Scholl
1
PETS
2
Post Quantum
1
Pratyay Mukherjee
1
Private Set Intersection
8
Ran Gilad-Bachrach
2
Roberto Trifiletti
1
Secret Sharing
3
Secure Join
1
Seim-honest
1
Semi-honest
5
semi-honest
1
Shashank Agrawal
1
Threshold Cryptography
1
Usenix
1
Yuhou Xia
1
Yuval Ishai
1
2PC
-
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
27 Feb 2019 -
Endemic Oblivious Transfer
27 Feb 2019 -
Cheaper Private Set Intersection via Differentially Private Leakage
27 Feb 2019 -
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
PIR-PSI: Scaling Private Contact Discovery
09 Oct 2017 -
Malicious-Secure Private Set Intersection via Dual Execution
09 Oct 2017 -
Implementing and Analyzing Homomorphic UC Commitments
10 May 2017 -
Fast Private Set Intersection from Homomorphic Encryption
31 Mar 2017 -
Private Queries on Encrypted Genomic Data
28 Feb 2017 -
Improved Private Set Intersection against Malicious Adversaries
30 Jul 2016 -
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
17 Jun 2016
CCS
-
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
27 Feb 2019 -
Endemic Oblivious Transfer
27 Feb 2019 -
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
DiSE: Distributed Symmetric-key Encryption
06 Oct 2018 -
ABY3: A Mixed Protocol Framework for Machine Learning
30 Apr 2018
ccs
coroutine
cpp
Daniel Demmler
Daniel Masny
Differential Privacy
Elette Boyle
FHE
Garbled Circuit
Geoffroy Couteau
Gizem S Cetin
Hao Chen
Honest Majority
Kim Laine
-
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
Fast Private Set Intersection from Homomorphic Encryption
31 Mar 2017 -
Private Collaborative Neural Network Learning
28 Feb 2017 -
Private Queries on Encrypted Genomic Data
28 Feb 2017 -
Secure Data Exchange: A Marketplace in the Cloud
14 Jun 2016
Kristin Lauter
Lisa Kohl
Machine Learning
Malicious
-
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
27 Feb 2019 -
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
27 Feb 2019 -
Endemic Oblivious Transfer
27 Feb 2019 -
Endemic Oblivious Transfer
27 Feb 2019 -
Cheaper Private Set Intersection via Differentially Private Leakage
27 Feb 2019 -
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
DiSE: Distributed Symmetric-key Encryption
06 Oct 2018 -
ABY3: A Mixed Protocol Framework for Machine Learning
30 Apr 2018 -
Malicious-Secure Private Set Intersection via Dual Execution
09 Oct 2017 -
Implementing and Analyzing Homomorphic UC Commitments
10 May 2017 -
Improved Private Set Intersection against Malicious Adversaries
30 Jul 2016 -
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
17 Jun 2016 -
Secure Data Exchange: A Marketplace in the Cloud
14 Jun 2016
Melissa Chase Peter Rindal
Mike Rosulek
-
Fast Database Joins for Secret Shared Data
27 Apr 2019 -
Cheaper Private Set Intersection via Differentially Private Leakage
27 Feb 2019 -
PIR-PSI: Scaling Private Contact Discovery
09 Oct 2017 -
Malicious-Secure Private Set Intersection via Dual Execution
09 Oct 2017 -
Improved Private Set Intersection against Malicious Adversaries
30 Jul 2016 -
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
17 Jun 2016 -
Secure Data Exchange: A Marketplace in the Cloud
14 Jun 2016
MPC
Niv Gilboa
Oblivious Transfer
-
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
27 Feb 2019 -
Endemic Oblivious Transfer
27 Feb 2019 -
Cheaper Private Set Intersection via Differentially Private Leakage
27 Feb 2019 -
Malicious-Secure Private Set Intersection via Dual Execution
09 Oct 2017 -
Implementing and Analyzing Homomorphic UC Commitments
10 May 2017 -
Improved Private Set Intersection against Malicious Adversaries
30 Jul 2016 -
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
17 Jun 2016 -
Secure Data Exchange: A Marketplace in the Cloud
14 Jun 2016
Payman Mohassel
Peter Scholl
PETS
Post Quantum
Pratyay Mukherjee
Private Set Intersection
-
Fast Database Joins for Secret Shared Data
27 Apr 2019 -
Cheaper Private Set Intersection via Differentially Private Leakage
27 Feb 2019 -
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
PIR-PSI: Scaling Private Contact Discovery
09 Oct 2017 -
Malicious-Secure Private Set Intersection via Dual Execution
09 Oct 2017 -
Fast Private Set Intersection from Homomorphic Encryption
31 Mar 2017 -
Improved Private Set Intersection against Malicious Adversaries
30 Jul 2016 -
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
17 Jun 2016
Ran Gilad-Bachrach
Roberto Trifiletti
Secret Sharing
Semi-honest
-
Fast Database Joins for Secret Shared Data
27 Apr 2019 -
Label-PSI from Fully Homomorphic Encryption with Malicious Security
06 Oct 2018 -
PIR-PSI: Scaling Private Contact Discovery
09 Oct 2017 -
Fast Private Set Intersection from Homomorphic Encryption
31 Mar 2017 -
Private Collaborative Neural Network Learning
28 Feb 2017