Scalable and Unconditionally Secure Multiparty Computation

From MaRDI portal
Publication:3612571

DOI10.1007/978-3-540-74143-5_32zbMath1215.94041OpenAlexW1528693676MaRDI QIDQ3612571

Jesper Buus Nielsen, Ivan B. Damgård

Publication date: 10 March 2009

Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_32




Related Items (61)

Fluid MPC: secure multiparty computation with dynamic participantsATLAS: efficient and scalable MPC in the honest majority settingUnconditional communication-efficient MPC via Hall's marriage theoremEfficient information-theoretic multi-party computation over non-commutative ringsEfficient Multi-party Computation: From Passive to Active Security via Secure SIMD CircuitsEfficient noise generation to achieve differential privacy with applications to secure multiparty computationImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsHonest majority MPC with abort with minimal online communicationQuantum private comparison against decoherence noiseImproved signature schemes for secure multi-party computation with certified inputsSecure multi-party computation in large networksStoring and Retrieving Secrets on a BlockchainFault-tolerate quantum private comparison based on GHZ states and ECCGraph coloring applied to secure computation in non-abelian groupsA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsAn efficient identity tracing scheme for blockchain-based systems\textsc{SuperPack}: dishonest majority MPC with constant online communicationBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyLe Mans: dynamic and fluid MPC for dishonest majorityMPClan: protocol suite for privacy-conscious computationsSharing transformation and dishonest majority MPC with packed secret sharingAttaining GOD beyond honest majority with friends and foesNon-interactive zero-knowledge proofs to multiple verifiersImproved single-round secure multiplication using regenerating codesPrivacy preserving solution of DCOPs by mediationOn linear communication complexity for (maximally) fluid MPCOn the Amortized Communication Complexity of Byzantine BroadcastOn the exact round complexity of best-of-both-worlds multi-party computationAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Efficient fully secure computation via distributed zero-knowledge proofsOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceOn communication-efficient asynchronous MPC with adaptive securityMultiplicative and verifiably multiplicative secret sharing for multipartite adversary structuresQuantum private comparison based on phase encoding of single photonsDecentralized polling with respectable participantsCommunication-efficient proactive secret sharing for dynamic groups with dishonest majoritiesImproved building blocks for secure multi-party computation based on secret sharing with honest majorityFast large-scale honest-majority MPC for malicious adversariesPC-SyncBB: a privacy preserving collusion secure DCOP algorithmEfficient robust secret sharing from expander graphsTinyKeys: a new approach to efficient multi-party computationEfficient asynchronous verifiable secret sharing and multiparty computationCommunication-Optimal Proactive Secret Sharing for Dynamic GroupsOn the exact round complexity of secure three-party computationEfficient and Decentralized Polling Protocol for General Social NetworksEfficient perfectly secure computation with optimal resilienceLow cost constant round MPC combining BMR and oblivious transferEfficient perfectly secure computation with optimal resilienceOrder-C secure multiparty computation for highly repetitive circuitsThe more the merrier: reducing the cost of large scale MPCConstant-overhead unconditionally secure multiparty computation over binary fieldsLarge scale, actively secure computation from LPN and free-XOR garbled circuitsLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingNetwork Oblivious TransferOn the Communication Required for Unconditionally Secure MultiplicationFrom Passive to Covert Security at Low CostRound Efficient Unconditionally Secure Multiparty Computation ProtocolGuaranteed output delivery comes free in honest majority MPCAn efficient passive-to-active compiler for honest-majority MPC over ringsThe price of active security in cryptographic protocols







This page was built for publication: Scalable and Unconditionally Secure Multiparty Computation