TASTY is a Tool for Automating (i.e., describing, generating, executing, benchmarking, and comparing) efficient Secure Two-partY computation protocols using combinations of garbled circuits and homomorphic encryption techniques.
The source code of TASTY is available at https://github.com/tastyproject/tasty.
The documentation on how to install and use TASTY can be found at [https://github.com/encryptogroup/tasty/blob/master/wiki/Doc_Binary.wiki]
The following publication contains a detailed description of TASTY:
- TASTY: Tool for Automating Secure Two-partY computations.
By Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg.
In 17th ACM Conference on Computer and Communications Security (CCS'10), pages 451-462, ACM, October 4-8, 2010.
Full version available as Cryptology ePrint Archive, Report 2010/365.
The underlying protocols are described in the following two publications:
-
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
By Thomas Schneider.
Springer-Verlag Berlin Heidelberg, August 4, 2012. -
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
By Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider.
In Journal of Computer Security (JCS), 21(2):283-315, 01 2013.
Preliminary version available as Cryptology ePrint Archive, Report 2010/079.