Circuits resilient to additive attacks with applications to secure computation

From MaRDI portal
Publication:5259585

DOI10.1145/2591796.2591861zbMath1315.94073OpenAlexW2133382302MaRDI QIDQ5259585

Manoj Prabhakaran, Daniel Genkin, Yuval Ishai, Amit Sahai, Eran Tromer

Publication date: 26 June 2015

Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2591796.2591861




Related Items (35)

Fluid MPC: secure multiparty computation with dynamic participantsATLAS: efficient and scalable MPC in the honest majority settingUnconditional communication-efficient MPC via Hall's marriage theoremSublinear GMW-style compiler for MPC with preprocessingTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeBinary AMD Circuits from Secure Multiparty ComputationAsymptotically quasi-optimal cryptographySecure multiparty computation with sublinear preprocessingActively secure arithmetic computation and VOLE with constant computational overhead\textsc{SuperPack}: dishonest majority MPC with constant online communicationConstant-Round Asynchronous Multi-Party Computation Based on One-Way FunctionsHigh-throughput secure three-party computation with an honest majorityMPClan: protocol suite for privacy-conscious computationsNon-interactive zero-knowledge proofs to multiple verifiersOblivious transfer with constant computational overheadArithmetic sketchingOn linear communication complexity for (maximally) fluid MPCAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Secure computation with low communication from cross-checkingContinuously non-malleable codes in the split-state modelFast large-scale honest-majority MPC for malicious adversariesEfficient, actively secure MPC with a dishonest majority: a surveySubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierRound-optimal secure multi-party computationGoing beyond dual execution: MPC for functions with efficient verificationOrder-C secure multiparty computation for highly repetitive circuitsThe more the merrier: reducing the cost of large scale MPCConstant-overhead unconditionally secure multiparty computation over binary fieldsSecure Protocol TransformationsOn the Communication Required for Unconditionally Secure MultiplicationGuaranteed output delivery comes free in honest majority MPCImproved primitives for MPC over mixed arithmetic-binary circuitsAn efficient passive-to-active compiler for honest-majority MPC over ringsThe price of active security in cryptographic protocols


Uses Software


Cites Work


This page was built for publication: Circuits resilient to additive attacks with applications to secure computation