Efficient Constant Round Multi-party Computation Combining BMR and SPDZ

From MaRDI portal
Publication:3457072

DOI10.1007/978-3-662-48000-7_16zbMath1352.94049OpenAlexW3031847131MaRDI QIDQ3457072

Yehuda Lindell, Avishay Yanai, Benny Pinkas, Nigel P. Smart

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://eprint.iacr.org/2015/523




Related Items (28)

Two attacks on rank metric code-based schemes: RankSign and an IBE schemeAn efficient structural attack on NIST submission DAGSMore Efficient Constant-Round Multi-party Computation from BMR and SHEFull-threshold actively-secure multiparty arithmetic circuit garblingMArBLed circuits: mixing arithmetic and Boolean circuits with active securityHow to simulate it in Isabelle: towards formal proof for secure multi-party computationActively secure half-gates with minimum overhead under duplex networksMPClan: protocol suite for privacy-conscious computationsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsOn multiparty garbling of arithmetic circuitsSecure computation with low communication from cross-checkingConcretely efficient large-scale MPC with active security (or tinykeys for tinyot)TinyKeys: a new approach to efficient multi-party computationActively secure garbled circuits with constant communication overhead in the plain modelScalable Multi-party Private Set-IntersectionBlock cipher invariants as eigenvectors of correlation matricesRound-optimal secure multi-party computationLow cost constant round MPC combining BMR and oblivious transferTopology-hiding computation for networks with unknown delaysGoing beyond dual execution: MPC for functions with efficient verificationLarge scale, actively secure computation from LPN and free-XOR garbled circuitsBetter Preprocessing for Secure Multiparty ComputationNetwork Oblivious TransferProbabilistic Termination and Composability of Cryptographic ProtocolsProbabilistic termination and composability of cryptographic protocolsEfficient constant-round MPC with identifiable abort and public verifiabilityThe price of active security in cryptographic protocolsBroadcast-optimal two-round MPC


Uses Software



This page was built for publication: Efficient Constant Round Multi-party Computation Combining BMR and SPDZ