Fluid MPC: secure multiparty computation with dynamic participants
From MaRDI portal
Publication:2128557
DOI10.1007/978-3-030-84245-1_4OpenAlexW3038091381MaRDI QIDQ2128557FDOQ2128557
Authors: Yanyan Li
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84245-1_4
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer system organization (68Mxx)
Cites Work
- Multiparty Computation from Somewhat Homomorphic Encryption
- Title not available (Why is that?)
- How to withstand mobile virus attacks (extended abstract)
- Scalable and Unconditionally Secure Multiparty Computation
- Theory of Cryptography
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Circuits resilient to additive attacks with applications to secure computation
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Theory of Cryptography
- Scalable Secure Multiparty Computation
- The Bitcoin Backbone Protocol: Analysis and Applications
- Fast large-scale honest-majority MPC for malicious adversaries
- Binary AMD circuits from secure multiparty computation
- Analysis of the Blockchain Protocol in Asynchronous Networks
- FruitChains: a fair blockchain
- Minimising communication in honest-majority MPC by batchwise multiplication verification
- Proactive secure multiparty computation with a dishonest majority
- Guaranteed output delivery comes free in honest majority MPC
- Algorand: a secure and efficient distributed ledger
- Efficient multi-party computation: from passive to active security via secure SIMD circuits
- How to withstand mobile virus attacks, revisited
Cited In (14)
- Improved single-round secure multiplication using regenerating codes
- MPC with delayed parties over star-like networks
- Le Mans: dynamic and fluid MPC for dishonest majority
- Cryptography with weights: MPC, encryption and signatures
- On linear communication complexity for (maximally) fluid MPC
- Perfect MPC over layered graphs
- Public randomness extraction with ephemeral roles and worst-case corruptions
- On information-theoretic secure multiparty computation with local repairability
- Publicly verifiable secret sharing over class groups and applications to DKG and YOSO
- Malicious security for SCALES. Outsourced computation with ephemeral servers
- SCALES. MPC with small clients and larger ephemeral servers
- Blockchains enable non-interactive MPC
- Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation
- Random-index PIR and applications
Uses Software
This page was built for publication: Fluid MPC: secure multiparty computation with dynamic participants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2128557)