Skip to main content

Showing 1–2 of 2 results for author: Mood, B

Searching in archive cs. Search in all archives.
.
  1. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  2. arXiv:1506.02954  [pdf, other

    cs.CR

    Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

    Authors: Benjamin Mood, Debayan Gupta, Kevin Butler, Joan Feigenbaum

    Abstract: Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validation stage of a computation. Moreover, SFE research has not yet devoted sufficient attention to the important problem of retaining state after a computa… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

    Comments: 20 pages, shorter conference version published in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Pages 582-596, ACM New York, NY, USA