Characterization of secure multiparty computation without broadcast
From MaRDI portal
Recommendations
- Characterization of secure multiparty computation without broadcast
- An efficient approach for secure multi-party computation without authenticated channel
- Secure multi-party computation without agreement
- Secure multiparty computations without computers
- Non-interactive secure multiparty computation
- The broadcast message complexity of secure multiparty computation
- Secure multiparty computation without one-way functions
- An efficient construction of non-interactive secure multiparty computation
- Multiparty Computations in Non-private Environments
- An Efficient Framework for Unconditionally Secure Multiparty Computation
Cites work
- scientific article; zbMATH DE number 2009948 (Why is no real title available?)
- Almost-optimally fair multiparty coin-tossing with nearly three-quarters malicious
- An Optimally Fair Coin Toss
- Authenticated Algorithms for Byzantine Agreement
- Characterization of secure multiparty computation without broadcast
- Complete Fairness in Multi-party Computation without an Honest Majority
- Detectable Byzantine agreement secure against faulty majorities
- Easy impossibility proofs for distributed consensus problems
- Fair coin flipping: tighter analysis and the many-party case
- Fairness versus guaranteed output delivery in secure multiparty computation
- Foundations of Cryptography
- Protocols for multiparty coin toss with a dishonest majority
- Reaching Agreement in the Presence of Faults
- Secure multi-party computation without agreement
- The Byzantine Generals Problem
- The Weak Byzantine Generals Problem
- Unconditional Byzantine agreement for any number of faulty processors (extended abstract)
Cited in
(10)- Broadcast-optimal two-round MPC
- On the power of an honest majority in three-party computation without broadcast
- On secure computation of solitary output functionalities with and without broadcast
- Complete characterization of broadcast and pseudo-signatures from correlations
- Must the communication graph of MPC protocols be an expander?
- scientific article; zbMATH DE number 4191080 (Why is no real title available?)
- On the power of an honest majority in three-party computation without broadcast
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- Characterization of secure multiparty computation without broadcast
- A zero-one law for secure multi-party computation with ternary outputs
This page was built for publication: Characterization of secure multiparty computation without broadcast
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753172)