Secure multi-party computation made simple
From MaRDI portal
Publication:2489932
Recommendations
Cites work
- scientific article; zbMATH DE number 1302842 (Why is no real title available?)
- scientific article; zbMATH DE number 1303136 (Why is no real title available?)
- scientific article; zbMATH DE number 1304080 (Why is no real title available?)
- scientific article; zbMATH DE number 1942444 (Why is no real title available?)
- scientific article; zbMATH DE number 1952886 (Why is no real title available?)
- scientific article; zbMATH DE number 1497864 (Why is no real title available?)
- scientific article; zbMATH DE number 1504552 (Why is no real title available?)
- scientific article; zbMATH DE number 1842487 (Why is no real title available?)
- An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement
- Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
- General secure multi-party computation from any linear secret-sharing scheme
- Player simulation and general adversary structures in perfect multiparty computation
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
- Security and composition of multiparty cryptographic protocols
- The Byzantine Generals Problem
Cited in
(25)- Computationally sound abstraction and verification of secure multi-party computations
- The meeting businessmen problem: requirements and limitations
- On \(d\)-multiplicative secret sharing
- Minimal complete primitives for secure multi-party computation
- TinyKeys: a new approach to efficient multi-party computation
- scientific article; zbMATH DE number 1952886 (Why is no real title available?)
- MPC vs. SFE : Unconditional and Computational Security
- MPC with delayed parties over star-like networks
- MPC for \(\mathcal{Q}_2\) access structures over rings and fields
- The cost of IEEE arithmetic in secure computation
- Operations over linear secret sharing schemes
- Improved signature schemes for secure multi-party computation with certified inputs
- Asynchronous privacy-preserving iterative computation on peer-to-peer networks
- Perfect MPC over layered graphs
- Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
- Public randomness extraction with ephemeral roles and worst-case corruptions
- Spin-the-bottle sort and annealing sort: oblivious sorting via round-robin random comparisons
- scientific article; zbMATH DE number 1848306 (Why is no real title available?)
- VSS Made Simpler
- Efficient fully secure computation via distributed zero-knowledge proofs
- Strong \((n, t, n)\) verifiable secret sharing scheme
- Multiparty computation, an introduction
- On-line secret sharing
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
- When is a semi-honest secure multiparty computation valuable?
This page was built for publication: Secure multi-party computation made simple
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489932)