Modes of Operation Suitable for Computing on Encrypted Data

We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do n...

Full description

Bibliographic Details
Main Authors: Dragos Rotaru, Nigel P. Smart, Martijn Stam
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-09-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/775