Secure outsourced garbled circuit evaluation for mobile devices
نویسندگان
چکیده
منابع مشابه
A Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only have access to the comparatively sparse c...
متن کاملSecure Outsourced Garbled Circuit Evaluation for Mobile Devices
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only have access to the comparatively sparse c...
متن کاملMemory-Efficient Garbled Circuit Generation for Mobile Devices
Secure function evaluation (SFE) on mobile devices, such as smartphones, creates compelling new applications such as privacypreserving bartering. Generating custom garbled circuits on smartphones, however, is infeasible for all but the most trivial problems due to the high memory overhead incurred. In this paper, we develop a new methodology of generating garbled circuits that is memory-efficie...
متن کاملSecure policy execution using reusable garbled circuit in the cloud
While cloud computing is fairly mature, there are underpinning data privacy and confidentiality issues that have yet to be resolved by existing security solutions such as cross domain access control policies. The latter necessitates the sharing of attributes with a Trusted Third Party (TTP), which in turn raises data privacy concerns. In this paper, we present a Privacy Aware Cross Tenant Acces...
متن کاملEnforcing Input Correctness via Certification in Garbled Circuit Evaluation
Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that treat the participants as semi-honest or malicious, respectively, are normally considered for showing security of constructions in this framework. In this work, we go beyond the standard security mod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Security
سال: 2016
ISSN: 1875-8924,0926-227X
DOI: 10.3233/jcs-150540