Academia.eduAcademia.edu

Secure Two-party Computation

94 papers
1 follower
AI Powered
Secure Two-party Computation (2PC) is a cryptographic protocol that enables two parties to jointly compute a function over their inputs while keeping those inputs private. It ensures that neither party learns anything about the other's input beyond the output of the computation, thus preserving confidentiality and security in collaborative data processing.
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without... more
A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Specifically, we address the following question. Since the primary task in data mining is the development of... more
Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure two-party computation a realis- tic paradigm. Yet, thus far, interest in this paradigm has remained mostly theoretical. This... more
In this paper we generalize the concept of Private Information Retrieval (PIR) by formalizing a new cryptographic primitive, named Extended Private Information Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block)... more
We consider the central cryptographic task of secure two- party computation: two parties wish to compute some function of their private inputs (each receiving possibly different outputs) where security should hold with respect to... more
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy-protection vulnerabilities. Customers should be able to... more
It is well known that, in theory, the general secure multi-party computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that... more
We present the design and implementation of a compiler that automatically generates protocols that perform two-party computations. The input to our protocol is the specification of a computation with secret inputs (e.g., a signature... more