Asynchronous secure computation

From MaRDI portal
Publication:5248471

DOI10.1145/167088.167109zbMath1310.68044OpenAlexW2011665720MaRDI QIDQ5248471

Oded Goldreich, Ran Canetti, Michael Ben-Or

Publication date: 7 May 2015

Published in: Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/167088.167109



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (28)

High-threshold AVSS with optimal communication complexityPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Improving the efficiency of optimally-resilient statistically-secure asynchronous multi-party computationHigh throughput secure MPC over small population in hybrid networks (extended abstract)The Cost of Fault Tolerance in Multi-Party Communication ComplexityRevisiting asynchronous fault tolerant computation with optimal resilienceOptimal extension protocols for Byzantine broadcast and agreementSecure multi-party computation in large networksInterplay between (im)perfectness, synchrony and connectivity: the case of reliable message transmissionConstant-Round Asynchronous Multi-Party Computation Based on One-Way FunctionsReaching consensus for asynchronous distributed key generationRevisiting the efficiency of asynchronous MPC with optimal resilience against general adversariesAsymptotically free broadcast in constant expected time via packed VSSRevisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversariesCategorical composable cryptography: extended versionCategorical composable cryptography\textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generationNetwork-agnostic security comes (almost) for free in DKG and MPCAlmost-surely terminating asynchronous Byzantine agreement against general adversaries with optimal resilienceSecure message transmission in asynchronous networksAsynchronous Multi-Party Computation with Quadratic CommunicationCryptography and cryptographic protocolsReducing communication costs in robust peer-to-peer networksEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceEfficient asynchronous verifiable secret sharing and multiparty computationTopology-hiding computation for networks with unknown delaysLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingAlways have a backup plan: fully secure synchronous MPC with asynchronous fallback




This page was built for publication: Asynchronous secure computation