Scalable Secure Multiparty Computation

From MaRDI portal
Revision as of 06:03, 7 March 2024 by Import240305080351 (talk | contribs) (Created automatically from import240305080351)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5756646

DOI10.1007/11818175_30zbMath1161.94394OpenAlexW1542382722MaRDI QIDQ5756646

Yuval Ishai, Ivan B. Damgård

Publication date: 4 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11818175_30




Related Items (37)

Fluid MPC: secure multiparty computation with dynamic participantsBest possible information-theoretic MPCTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeBinary AMD Circuits from Secure Multiparty ComputationLarge-Scale Secure Computation: Multi-party Computation for (Parallel) RAM ProgramsSecure multi-party computation in large networksOn the Bottleneck Complexity of MPC with Correlated RandomnessA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsLigero: lightweight sublinear arguments without a trusted setupBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyEfficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysEfficient NIZKs from LWE via polynomial reconstruction and ``MPC in the headUnnamed ItemNetwork-agnostic security comes (almost) for free in DKG and MPCTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?On communication-efficient asynchronous MPC with adaptive securitySecure computation with low communication from cross-checkingMulti-party computation with conversion of secret sharingFast large-scale honest-majority MPC for malicious adversariesEfficient robust secret sharing from expander graphsActively secure garbled circuits with constant communication overhead in the plain modelEfficient asynchronous verifiable secret sharing and multiparty computationGraph Design for Secure Multiparty Computation over Non-Abelian GroupsOT-Combiners via Secure ComputationFrom fairness to full security in multiparty computationRound-optimal secure multi-party computationLow cost constant round MPC combining BMR and oblivious transferOn the power of secure two-party computationOrder-C secure multiparty computation for highly repetitive circuitsThe more the merrier: reducing the cost of large scale MPCNetwork Oblivious TransferOn the Power of Secure Two-Party ComputationSecure Protocol TransformationsCounting Method for Multi-party Computation over Non-abelian GroupsGarbled Circuits as Randomized Encodings of Functions: a PrimerThe price of active security in cryptographic protocols




This page was built for publication: Scalable Secure Multiparty Computation