Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender

Reviewed Paper In Proceedings

Author(s):Florian Böhl, Simon Greiner, and Patrik Scheidecker
In:13th International Conference on Cryptology and Network Security (CANS 2014)
Publisher:Springer
Series:Lecture Notes in Computer Science
Volume:8813
Year:2014
Pages:175-190
URL:http://dx.doi.org/10.1007/978-3-319-12280-9_12
DOI:10.1007/978-3-319-12280-9_12

BibTeX

@inproceedings{Grei14,
  year      = {2014},
  month     = oct,
  isbn      = {978-3-319-12279-3},
  booktitle = {13th International Conference on Cryptology and Network Security (CANS 2014)},
  volume    = {8813},
  series    = {Lecture Notes in Computer Science},
  editor    = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis},
  doi       = {10.1007/978-3-319-12280-9_12},
  title     = {Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender},
  url       = {http://dx.doi.org/10.1007/978-3-319-12280-9_12},
  publisher = {Springer},
  author    = {Florian Böhl and Simon Greiner and Patrik Scheidecker},
  pages     = {175--190},
  place     = {Heraklion, Crete, Greece},
  date      = {October 22-24}
}