Going beyond dual execution: MPC for functions with efficient verification
From MaRDI portal
Publication:2055697
DOI10.1007/978-3-030-45388-6_12OpenAlexW3021910883MaRDI QIDQ2055697FDOQ2055697
Authors: Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-45388-6_12
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Algorithms – ESA 2004
- A proof of security of Yao's protocol for two-party computation
- Secure two-party computation via cut-and-choose oblivious transfer
- A new approach to practical active-secure two-party computation
- Foundations of Cryptography
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- Founding Cryptography on Oblivious Transfer – Efficiently
- Secure Arithmetic Computation with No Honest Majority
- LEGO for Two-Party Secure Computation
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2006
- The round complexity of verifiable secret sharing and secure multicast
- Maximum matchings in general graphs through randomization
- Circuits resilient to additive attacks with applications to secure computation
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Title not available (Why is that?)
- Fast large-scale honest-majority MPC for malicious adversaries
- Optimizing authenticated garbling for faster secure two-party computation
- Fast distributed RSA key generation for semi-honest and malicious adversaries
- Low cost constant round MPC combining BMR and oblivious transfer
- Secure arithmetic computation with constant computational overhead
- Binary AMD circuits from secure multiparty computation
- Overdrive: making SPDZ great again
- Efficient constant round multi-party computation combining BMR and SPDZ
- Actively secure garbled circuits with constant communication overhead in the plain model
- Efficient, oblivious data structures for MPC
- Efficient multi-party computation: from passive to active security via secure SIMD circuits
- A simpler minimum spanning tree verification algorithm
Cited In (2)
This page was built for publication: Going beyond dual execution: MPC for functions with efficient verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2055697)