Round-optimal secure multiparty computation with honest majority
From MaRDI portal
Publication:1784101
DOI10.1007/978-3-319-96881-0_14zbMATH Open1436.94029OpenAlexW2883285857MaRDI QIDQ1784101FDOQ1784101
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Publication date: 26 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96881-0_14
Cited In (29)
- Beyond honest majority: the round complexity of fair and robust multi-party computation
- Broadcast-optimal two-round MPC
- Broadcast-optimal two round MPC with an honest majority
- On actively-secure elementary MPC reductions
- Broadcast-optimal four-round MPC in the plain model
- On the round complexity of fully secure solitary MPC with honest majority
- On the exact round complexity of secure three-party computation
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
- Round-optimal secure multi-party computation
- Perfect secure computation in two rounds
- Two-round MPC: information-theoretic and black-box
- Broadcast-optimal two round MPC with asynchronous peer-to-peer channels
- Towards round-optimal secure multiparty computations: multikey FHE without a CRS
- One-round secure fair meeting location determination based on homomorphic encryption
- Multiparty reusable non-interactive secure computation from LWE
- Proactive secure multiparty computation with a dishonest majority
- More efficient dishonest majority secure computation over \(\mathbb{Z}_{2^k}\) via Galois rings
- Fully-secure MPC with minimal trust
- Adaptively secure MPC with sublinear communication complexity
- The round complexity of statistical MPC with optimal resiliency
- Secure MPC: laziness leads to GOD
- Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)
- On the exact round complexity of best-of-both-worlds multi-party computation
- Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?
- Optimal bounded-collusion secure functional encryption
- Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
- On communication models and best-achievable security in two-round MPC
- Round Efficient Unconditionally Secure Multiparty Computation Protocol
- Perfect Secure Computation in Two Rounds
This page was built for publication: Round-optimal secure multiparty computation with honest majority
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784101)