Perfectly-Secure MPC with Linear Communication Complexity

From MaRDI portal
Publication:5445508

DOI10.1007/978-3-540-78524-8_13zbMath1162.94336OpenAlexW48039395MaRDI QIDQ5445508

Zuzana Beerliová-Trubíniová, Martin Hirt

Publication date: 5 March 2008

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_13




Related Items (39)

Secure Computation, I/O-Efficient Algorithms and Distributed SignaturesATLAS: efficient and scalable MPC in the honest majority settingEfficient information-theoretic multi-party computation over non-commutative ringsAsymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCAn efficient structural attack on NIST submission DAGSHonest majority MPC with abort with minimal online communicationPerfectly-secure asynchronous MPC for general adversaries (extended abstract)High throughput secure MPC over small population in hybrid networks (extended abstract)Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois ringsDetect, pack and batch: perfectly-secure MPC with linear communication and constant expected timeAsymptotically free broadcast in constant expected time via packed VSSNetwork-agnostic security comes (almost) for free in DKG and MPCOn the Amortized Communication Complexity of Byzantine BroadcastDistributed CONGEST Algorithms against Mobile AdversariesAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Circuit amortization friendly encodingsand their application to statistically secure multiparty computationSecure message transmission in asynchronous networksOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceOn communication-efficient asynchronous MPC with adaptive securityConcretely efficient large-scale MPC with active security (or tinykeys for tinyot)Realistic versus Rational Secret SharingCommunication-efficient proactive secret sharing for dynamic groups with dishonest majoritiesFast large-scale honest-majority MPC for malicious adversariesA full proof of the BGW protocol for perfectly secure multiparty computationEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceEfficient asynchronous verifiable secret sharing and multiparty computationCommunication-Optimal Proactive Secret Sharing for Dynamic GroupsEfficient perfectly secure computation with optimal resilienceEfficient perfectly secure computation with optimal resilienceThe more the merrier: reducing the cost of large scale MPCConstant-overhead unconditionally secure multiparty computation over binary fieldsLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingProactive Secret Sharing with a Dishonest MajorityNetwork Oblivious TransferOn the Communication Required for Unconditionally Secure MultiplicationFrom Passive to Covert Security at Low CostThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsRound Efficient Unconditionally Secure Multiparty Computation ProtocolGuaranteed output delivery comes free in honest majority MPC




This page was built for publication: Perfectly-Secure MPC with Linear Communication Complexity