Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority

From MaRDI portal
Revision as of 21:12, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2914294


DOI10.1007/978-3-642-32009-5_39zbMath1296.94082MaRDI QIDQ2914294

Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_39


94A60: Cryptography


Related Items

On the Computational Overhead of MPC with Dishonest Majority, On the exact round complexity of secure three-party computation, Fast large-scale honest-majority MPC for malicious adversaries, Detect, pack and batch: perfectly-secure MPC with linear communication and constant expected time, Prio+: privacy preserving aggregate statistics via Boolean shares, Network-agnostic security comes (almost) for free in DKG and MPC, Efficient asynchronous verifiable secret sharing and multiparty computation, Constant-overhead unconditionally secure multiparty computation over binary fields, Guaranteed output delivery comes free in honest majority MPC, An efficient passive-to-active compiler for honest-majority MPC over rings, ATLAS: efficient and scalable MPC in the honest majority setting, Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPC, Honest majority MPC with abort with minimal online communication, Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings, Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities, Asymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \), Efficient fully secure computation via distributed zero-knowledge proofs, Information-theoretically secure MPC against mixed dynamic adversaries, On the communication efficiency of statistically secure asynchronous MPC with optimal resilience, On communication-efficient asynchronous MPC with adaptive security, Better Preprocessing for Secure Multiparty Computation, Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing, Proactive Secret Sharing with a Dishonest Majority, Network Oblivious Transfer, Secure Protocol Transformations, On the Communication Required for Unconditionally Secure Multiplication, Broadcast (and Round) Efficient Verifiable Secret Sharing, Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits