Outsourcing Secure Two-Party Computation as a Black Box

Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler. Outsourcing Secure Two-Party Computation as a Black Box. In Michael Reiter, David Naccache, editors, Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Volume 9476 of Lecture Notes in Computer Science, pages 214-222, Springer, 2015. [doi]

@inproceedings{CarterMTB15,
  title = {Outsourcing Secure Two-Party Computation as a Black Box},
  author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler},
  year = {2015},
  doi = {10.1007/978-3-319-26823-1_15},
  url = {http://dx.doi.org/10.1007/978-3-319-26823-1_15},
  researchr = {https://researchr.org/publication/CarterMTB15},
  cites = {0},
  citedby = {0},
  pages = {214-222},
  booktitle = {Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  editor = {Michael Reiter and David Naccache},
  volume = {9476},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-26822-4},
}