Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)

From MaRDI portal
Publication:5361463

DOI10.1145/259380.259412zbMath1374.68070OpenAlexW2052193425MaRDI QIDQ5361463

Ueli M. Maurer, Martin Hirt

Publication date: 29 September 2017

Published in: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/259380.259412




Related Items (21)

Resilient uniformity: applying resiliency in maskingOblivious transfer in incomplete networksBroadcast from Minicast Secure Against General AdversariesPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Reliable broadcast with respect to topology knowledgeGraph coloring applied to secure computation in non-abelian groupsRound-Optimal Perfectly Secret Message Transmission with Linear Communication ComplexityHow to deal with malicious users in privacy‐preserving distributed data miningBest of both worlds. Revisiting the spymasters double agent problemAlmost-surely terminating asynchronous Byzantine agreement against general adversaries with optimal resilienceMultiplicative and verifiably multiplicative secret sharing for multipartite adversary structuresRecursive hiding of biometrics-based secret sharing scheme using adversary structureThreshold protocols in survivor set systemsError decodable secret sharing and one-round perfectly secure message transmission for general adversary structuresMulti-party computation with conversion of secret sharingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPlayer-Centric Byzantine AgreementSecure multi-party computation made simpleMPC vs. SFE : Unconditional and Computational SecurityRefined quorum systemsByzantine Agreement Using Partial Authentication






This page was built for publication: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)