all InfoSec news
Reusable Secure Computation in the Plain Model
June 29, 2023, 8 a.m. |
IACR News www.iacr.org
ePrint Report: Reusable Secure Computation in the Plain Model
Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
Consider the standard setting of two-party computation where the sender has a secret function $f$ and the receiver has a secret input $x$ and the output $f(x)$ is delivered to the receiver at the end of the protocol. Let us consider the unidirectional message model where only one party speaks in each round. In this setting, Katz and Ostrovsky (Crypto 2004) showed that at least …
computation end eprint report function input party protocol report secret secure computation standard
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 9 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 9 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
1 day, 15 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
1 day, 15 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
1 day, 15 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Incident Response Lead
@ Blue Yonder | Hyderabad
GRC Analyst
@ Chubb | Malaysia
Information Security Manager
@ Walbec Group | Waukesha, WI, United States
Senior Executive / Manager, Security Ops (TSSQ)
@ SMRT Corporation Ltd | Singapore, SG
Senior Engineer, Cybersecurity
@ Sonova Group | Valencia (CA), United States
Consultant (Multiple Positions Available)
@ Atos | Plano, TX, US, 75093