all InfoSec news
Towards Topology-Hiding Computation from Oblivious Transfer
June 7, 2023, 12:36 p.m. |
IACR News www.iacr.org
ePrint Report: Towards Topology-Hiding Computation from Oblivious Transfer
Marshall Ball, Alexander Bienstock, Lisa Kohl, Pierre Meyer
Topology-Hiding Computation (THC) enables parties to securely compute a function on an incomplete network without revealing the network topology. It is known that secure computation on a complete network can be based on oblivious transfer (OT), even if a majority of the participating parties are corrupt. In contrast, THC in the dishonest majority setting is only known from assumptions that imply (additively) homomorphic encryption, …
computation compute eprint report function network oblivious report secure computation transfer
More from www.iacr.org / IACR News
PN-based Attacks in the White-box Setting
21 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
1 day, 3 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
1 day, 3 hours ago |
www.iacr.org
Committing AVID with Partial Retrieval and Optimal Storage
1 day, 3 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Offensive Security Engineering Technical Lead, Device Security
@ Google | Amsterdam, Netherlands
Senior Security Engineering Program Manager
@ Microsoft | Redmond, Washington, United States
Information System Security Analyst
@ Resource Management Concepts, Inc. | Dahlgren, Virginia, United States
Critical Facility Security Officer - Evening Shift
@ Allied Universal | Charlotte, NC, United States
Information System Security Officer, Junior
@ Resource Management Concepts, Inc. | Patuxent River, Maryland, United States
Security Engineer
@ JPMorgan Chase & Co. | Plano, TX, United States