GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Collection

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
View Item 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Software Engineering and Software Management
  • P239 - Software Engineering & Management 2015
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Software Engineering and Software Management
  • P239 - Software Engineering & Management 2015
  • View Item

Compilation for secure two-party computations

Author:
Franz, Martin [DBLP] ;
Holzer, Andreas [DBLP] ;
Katzenbeisser, Stefan [DBLP] ;
Schallhart, Christian [DBLP] ;
Veith, Helmut [DBLP]
Abstract
Secure two-party computation (STC) is a computer security paradigm that enables two distrusting parties to jointly compute on sensitive input data. While both parties are interested in the outcome of the computation, they are not willing to share their data with each other. Until recently, STC was deemed theoretical and impractical. However, novel efficient cryptographic primitives bring STC well within practical reach. Indeed, custom-tailored commercial STC products already appeared on the market. Unfortunately, a widespread application of STC is still hindered by the difficulty to implement STC protocols. While recent work proposed simple programming languages for the specification of STCs, they are still difficult to use for practitioners, and translating existing source code into this format is cumbersome. Similarly, the manual construction of STC protocols is labor intensive and error-prone.
  • Citation
  • BibTeX
Franz, M., Holzer, A., Katzenbeisser, S., Schallhart, C. & Veith, H., (2015). Compilation for secure two-party computations. In: Aßmann, U., Demuth, B., Spitta, T., Püschel, G. & Kaiser, R. (Hrsg.), Software-engineering and management 2015. Bonn: Gesellschaft für Informatik e.V.. (S. 143-144).
@inproceedings{mci/Franz2015,
author = {Franz, Martin AND Holzer, Andreas AND Katzenbeisser, Stefan AND Schallhart, Christian AND Veith, Helmut},
title = {Compilation for secure two-party computations},
booktitle = {Software-engineering and management 2015},
year = {2015},
editor = {Aßmann, Uwe AND Demuth, Birgit AND Spitta, Thorsten AND Püschel, Georg AND Kaiser, Ronny} ,
pages = { 143-144 },
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn}
}
DateienGroesseFormatAnzeige
143.pdf37.57Kb PDF View/Open

Haben Sie fehlerhafte Angaben entdeckt? Sagen Sie uns Bescheid: Send Feedback

More Info

ISBN: 978-3-88579-633-6
ISSN: 1617-5468
xmlui.MetaDataDisplay.field.date: 2015
Language: en (en)
Content Type: Text/Conference Paper
Collections
  • P239 - Software Engineering & Management 2015 [114]

Show full item record


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.