More efficient constant-round multi-party computation from BMR and SHE
From MaRDI portal
Publication:3179370
Recommendations
- Efficient constant-round multi-party computation combining BMR and SPDZ
- Efficient constant round multi-party computation combining BMR and SPDZ
- Low cost constant round MPC combining BMR and oblivious transfer
- Efficient scalable constant-round MPC via garbled circuits
- Low cost constant round MPC combining BMR and oblivious transfer
Cites work
- A new approach to practical active-secure two-party computation
- A simpler variant of universally composable security for standard multiparty computation
- Adaptively secure multi-party computation from LWE (via equivocal FHE)
- Advances in Cryptology – CRYPTO 2004
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Better preprocessing for secure multiparty computation
- Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
- Dishonest majority multi-party computation for binary circuits
- Efficient constant round multi-party computation combining BMR and SPDZ
- Efficient secure two-party computation using symmetric cut-and-choose
- Efficient three-party computation from cut-and-choose
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Founding Cryptography on Oblivious Transfer – Efficiently
- Fully homomorphic encryption using ideal lattices
- More efficient oblivious transfer extensions with security for malicious adversaries
- Multiparty Computation from Somewhat Homomorphic Encryption
- Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits
- Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces
- Secure multi-party computation without agreement
- Secure two-party computation is practical
- Secure two-party computation via cut-and-choose oblivious transfer
- The Exact Round Complexity of Secure Computation
- The IPS compiler: optimizations, variants and concrete efficiency
- Two-output secure computation with malicious adversaries
- Which ring based somewhat homomorphic encryption scheme is best?
Cited in
(11)- Broadcast-optimal two-round MPC
- Efficient constant-round multi-party computation combining BMR and SPDZ
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Scalable multi-party private set-intersection
- Actively secure half-gates with minimum overhead under duplex networks
- Efficient constant round multi-party computation combining BMR and SPDZ
- Mixed-technique multi-party computations composed of two-party computations
- Efficient constant-round MPC with identifiable abort and public verifiability
- Maliciously circuit-private multi-key FHE and MPC based on LWE
- TinyKeys: a new approach to efficient multi-party computation
- Low cost constant round MPC combining BMR and oblivious transfer
This page was built for publication: More efficient constant-round multi-party computation from BMR and SHE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3179370)