Modes of Operation Suitable for Computing on Encrypted Data
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do n...
Main Authors: | Dragos Rotaru, Nigel P. Smart, Martijn Stam |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2017-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/775 |
Similar Items
-
A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption
by: Yongbo Jiang, et al.
Published: (2022-10-01) -
The social constructivist mode of operation for personal computing
by: Frédérik Lesage, et al.
Published: (2017-09-01) -
Secure Multi-party Computing Protocol Based on Efficient Fully Homomorphic Encryption
by: ZHU Zong-wu, HUANG Ru-wei
Published: (2022-11-01) -
Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing
by: Keiichi Iwamura, et al.
Published: (2023-01-01) -
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing
by: Haoyang Yu, et al.
Published: (2023-05-01)