Bounded-concurrent secure multi-party computation with a dishonest majority

From MaRDI portal
Publication:3580972

DOI10.1145/1007352.1007393zbMath1192.68077OpenAlexW2064265141MaRDI QIDQ3580972

Rafael Pass

Publication date: 15 August 2010

Published in: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1007352.1007393




Related Items (38)

On the concurrent composition of quantum zero-knowledgeGame-theoretic fairness meets multi-party protocols: the case of leader electionAlmost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters MaliciousUnbounded ABE via bilinear entropy expansion, revisitedRound-optimal and communication-efficient multiparty computationRound-optimal multi-party computation with identifiable abort\(\log^\ast\)-round game-theoretically-fair leader electionAlmost-optimally fair multiparty coin-tossing with nearly three-quarters maliciousLower bounds and impossibility results for concurrent self compositionMaliciously secure massively parallel computation for all-but-one corruptionsEfficient NIZK arguments with straight-line simulation and extractionList oblivious transfer and applications to round-optimal black-box multiparty coin tossingOn concurrent multi-party quantum computationBlockchains enable non-interactive MPC\(1/p\)-secure multiparty computation without an honest majority and the best of both worldsSecure computation without authenticationAn Algebraic Approach to NonmalleabilityComputing boundary cycle of a pseudo-triangle polygon from its visibility graphCryptography Using Captcha PuzzlesOn the Exact Round Complexity of Self-composable Two-Party ComputationMagic Adversaries Versus Individual Reduction: Science Wins Either WayFrom fairness to full security in multiparty computationRound-optimal secure multi-party computationNon-Black-Box Simulation from One-Way Functions and Applications to Resettable SecurityOn the enumeration of minimal non-pairwise compatibility graphsProtocols for multiparty coin toss with a dishonest majorityThe Complexity of Zero KnowledgeLocal Sequentiality Does Not Help for Concurrent CompositionPrivate multiparty sampling and approximation of vector combinationsPost-quantum multi-party computationUniversally Composable Private Proximity TestingGeneral composition and universal composability in secure multiparty computationNetwork-Hiding Communication and Applications to Multi-party ProtocolsConcurrent Non-Malleable Commitments (and More) in 3 RoundsEfficient constant-round multi-party computation combining BMR and SPDZHow to obtain full privacy in auctionsConstant-Round Nonmalleable Commitments from Any One-Way FunctionEfficient constant-round MPC with identifiable abort and public verifiability






This page was built for publication: Bounded-concurrent secure multi-party computation with a dishonest majority