@article{1452, author = {A. Anasuya Threse Innocent, K. Sangeeta}, title = {Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach}, journal = {Journal of Information Security Research}, year = {2014}, volume = {5}, number = {1}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v5n1/2.pdf}, abstract = {Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities and generic approach to achieve efficient practical secure computation protocols. This paper considers the application secure two-party computation of AES-128 for comparison of the above two approaches.}, }