Catching MPC cheaters: identification and openability
From MaRDI portal
Recommendations
Cited in
(12)- Efficient, actively secure MPC with a dishonest majority: a survey
- How and how much to invest for fighting cheaters: from an ODE to a cellular automata model
- Identifying cheaters without an honest majority
- Your reputation's safe with me: framing-free distributed zero-knowledge proofs
- Secure multi-party computation with identifiable abort
- Efficient secure multiparty computation with identifiable abort
- Round-optimal multi-party computation with identifiable abort
- Efficient constant-round MPC with identifiable abort and public verifiability
- Cheater identification on a budget: MPC with identifiable abort from pairwise MACs
- Secure multiparty computation with identifiable abort via vindicating release
- Publicly auditable secure multi-party computation
- Cheater detection in SPDZ multiparty computation
This page was built for publication: Catching MPC cheaters: identification and openability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1705719)