Efficient secure multiparty computation with identifiable abort
From MaRDI portal
Publication:3179367
DOI10.1007/978-3-662-53641-4_18zbMATH Open1406.94025OpenAlexW2524585805MaRDI QIDQ3179367FDOQ3179367
Authors: Carsten Baum, Emmanuela Orsini, Peter Scholl
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: http://eprint.iacr.org/2016/187
Recommendations
Cites Work
- Multiparty Computation from Somewhat Homomorphic Encryption
- Foundations of Cryptography
- Constant-overhead secure computation of Boolean circuits using preprocessing
- (Leveled) fully homomorphic encryption without bootstrapping
- Leveled fully homomorphic signatures from standard lattices
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Semi-homomorphic encryption and multiparty computation
- Authenticated Algorithms for Byzantine Agreement
- Multiparty computation with low communication, computation and interaction via threshold FHE
- Title not available (Why is that?)
- \(1/p\)-secure multiparty computation without honest majority and the best of both worlds
- Title not available (Why is that?)
- Identifying cheaters without an honest majority
- Signatures for network coding
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure multi-party computation without agreement
- Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits
- Multi-valued Byzantine broadcast: the \(t < n\) case
- On the feasibility of extending oblivious transfer
- Fairness versus guaranteed output delivery in secure multiparty computation
- Better preprocessing for secure multiparty computation
- Secure multi-party computation with identifiable abort
- Unconditionally Secure Signature Schemes Revisited
- Implementing AES via an actively/covertly secure dishonest-majority MPC protocol
Cited In (17)
- Efficient, actively secure MPC with a dishonest majority: a survey
- Attaining GOD beyond honest majority with friends and foes
- Identifying cheaters without an honest majority
- On the correlation complexity of MPC with cheater identification
- Your reputation's safe with me: framing-free distributed zero-knowledge proofs
- (Public) verifiability for composable protocols without adaptivity or zero-knowledge
- Secure multi-party computation with identifiable abort
- CRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}ime
- Round-optimal multi-party computation with identifiable abort
- TARDIS: a foundation of time-lock puzzles in UC
- Efficient constant-round MPC with identifiable abort and public verifiability
- A Trustless GQ Multi-signature Scheme with Identifiable Abort
- On sufficient oracles for secure computation with identifiable abort
- Cheater identification on a budget: MPC with identifiable abort from pairwise MACs
- Secure multiparty computation with identifiable abort via vindicating release
- Catching MPC cheaters: identification and openability
- Cheater detection in SPDZ multiparty computation
Uses Software
This page was built for publication: Efficient secure multiparty computation with identifiable abort
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3179367)