[Resource Topic] 2013/046: Fast and Maliciously Secure Two-Party Computation Using the GPU

Welcome to the resource topic for 2013/046

Title:
Fast and Maliciously Secure Two-Party Computation Using the GPU

Authors: Tore Kasper Frederiksen, Jesper Buus Nielsen

Abstract:

We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. The protocol is based on cut-and-choose of Yao’s garbled circuit and an efficient oblivious transfer extension. The implementation is done using CUDA and yields fast results in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol introduces a novel construction in order to verify consistency of the garbled circuit constructor’s input in a parallel and maliciously secure setting.

ePrint: https://eprint.iacr.org/2013/046

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .