Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority

From MaRDI portal
Publication:2914294

DOI10.1007/978-3-642-32009-5_39zbMath1296.94082OpenAlexW1576843907MaRDI QIDQ2914294

Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_39




Related Items (28)

ATLAS: efficient and scalable MPC in the honest majority settingAsymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCEfficient Multi-party Computation: From Passive to Active Security via Secure SIMD CircuitsHonest majority MPC with abort with minimal online communicationEfficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois ringsBroadcast (and Round) Efficient Verifiable Secret SharingDetect, pack and batch: perfectly-secure MPC with linear communication and constant expected timePrio+: privacy preserving aggregate statistics via Boolean sharesNetwork-agnostic security comes (almost) for free in DKG and MPCAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Efficient fully secure computation via distributed zero-knowledge proofsInformation-theoretically secure MPC against mixed dynamic adversariesOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceOn communication-efficient asynchronous MPC with adaptive securityCommunication-efficient proactive secret sharing for dynamic groups with dishonest majoritiesFast large-scale honest-majority MPC for malicious adversariesOn the Computational Overhead of MPC with Dishonest MajorityEfficient asynchronous verifiable secret sharing and multiparty computationOn the exact round complexity of secure three-party computationConstant-overhead unconditionally secure multiparty computation over binary fieldsBetter Preprocessing for Secure Multiparty ComputationLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingProactive Secret Sharing with a Dishonest MajorityNetwork Oblivious TransferSecure Protocol TransformationsOn the Communication Required for Unconditionally Secure MultiplicationGuaranteed output delivery comes free in honest majority MPCAn efficient passive-to-active compiler for honest-majority MPC over rings




This page was built for publication: Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority