Show simple item record

dc.contributor.authorFranz, Martin
dc.contributor.authorHolzer, Andreas
dc.contributor.authorKatzenbeisser, Stefan
dc.contributor.authorSchallhart, Christian
dc.contributor.authorVeith, Helmut
dc.contributor.editorAßmann, Uwe
dc.contributor.editorDemuth, Birgit
dc.contributor.editorSpitta, Thorsten
dc.contributor.editorPüschel, Georg
dc.contributor.editorKaiser, Ronny
dc.date.accessioned2017-06-30T20:56:17Z
dc.date.available2017-06-30T20:56:17Z
dc.date.issued2015
dc.identifier.isbn978-3-88579-633-6
dc.identifier.issn1617-5468
dc.description.abstractSecure two-party computation (STC) is a computer security paradigm that enables two distrusting parties to jointly compute on sensitive input data. While both parties are interested in the outcome of the computation, they are not willing to share their data with each other. Until recently, STC was deemed theoretical and impractical. However, novel efficient cryptographic primitives bring STC well within practical reach. Indeed, custom-tailored commercial STC products already appeared on the market. Unfortunately, a widespread application of STC is still hindered by the difficulty to implement STC protocols. While recent work proposed simple programming languages for the specification of STCs, they are still difficult to use for practitioners, and translating existing source code into this format is cumbersome. Similarly, the manual construction of STC protocols is labor intensive and error-prone.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSoftware-engineering and management 2015
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-239
dc.titleCompilation for secure two-party computationsen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages143-144
mci.conference.locationDresden
mci.conference.date17.-20. März 2015


Files in this item

Thumbnail

Show simple item record