Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Secure two-party computation is practical

B Pinkas, T Schneider, NP Smart… - Advances in Cryptology …, 2009 - Springer
Secure multi-party computation has been considered by the cryptographic community for a
number of years. Until recently it has been a purely theoretical area, with few …

Founding cryptography on oblivious transfer–efficiently

Y Ishai, M Prabhakaran, A Sahai - … , Santa Barbara, CA, USA, August 17-21 …, 2008 - Springer
We present a simple and efficient compiler for transforming secure multi-party computation
(MPC) protocols that enjoy security only with an honest majority into MPC protocols that …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

How to use bitcoin to incentivize correct computations

R Kumaresan, I Bentov - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
We study a model of incentivizing correct computations in a variety of cryptographic tasks.
For each of these tasks we propose a formal model and design protocols satisfying our …

Secure two-party computation via cut-and-choose oblivious transfer

Y Lindell, B Pinkas - Journal of cryptology, 2012 - Springer
Protocols for secure two-party computation enable a pair of parties to compute a function of
their inputs while preserving security properties such as privacy, correctness and …

Improved garbled circuit building blocks and applications to auctions and computing minima

V Kolesnikov, AR Sadeghi, T Schneider - Cryptology and Network Security …, 2009 - Springer
Abstract We consider generic Garbled Circuit (GC)-based techniques for Secure Function
Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for …

{Billion-Gate} secure computation with malicious adversaries

B Kreuter, A Shelat, CH Shen - 21st USENIX Security Symposium …, 2012 - usenix.org
The goal of this paper is to assess the feasibility of two-party secure computation in the
presence of a malicious adversary. Prior work has shown the feasibility of billion-gate …