Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
From MaRDI portal
Publication:5451037
Recommendations
Cited in
(46)- Always have a backup plan: fully secure synchronous MPC with asynchronous fallback
- MPC with friends and foes
- Fast pseudorandom functions based on expander graphs
- Binary AMD circuits from secure multiparty computation
- Quadratic multiparty randomized encodings beyond honest majority and their applications
- Distributed protocols for oblivious transfer and polynomial evaluation
- scientific article; zbMATH DE number 2086626 (Why is no real title available?)
- Perfect MPC over layered graphs
- On the round complexity of black-box secure MPC
- On expected constant-round protocols for Byzantine agreement
- Constant-round asynchronous multi-party computation based on one-way functions
- Round-preserving parallel composition of probabilistic-termination cryptographic protocols
- Perfect secure computation in two rounds
- Best possible information-theoretic MPC
- Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
- Probabilistic Termination and Composability of Cryptographic Protocols
- Perfect secure computation in two rounds
- Topology-hiding computation for networks with unknown delays
- Efficient constant-round multi-party computation combining BMR and SPDZ
- Two attacks on rank metric code-based schemes: RankSign and an IBE scheme
- On actively-secure elementary MPC reductions
- Succinct arguments for RAM programs via projection codes
- Actively secure garbled circuits with constant communication overhead in the plain model
- Towards a unified approach to black-box constructions of zero-knowledge proofs
- Reputation at stake! A trust layer over decentralized ledger for multiparty computation and reputation-fair lottery
- Round-optimal black-box protocol compilers
- Must the communication graph of MPC protocols be an expander?
- Round-efficient black-box construction of composable multi-party computation
- Probabilistic termination and composability of cryptographic protocols
- Adaptively secure MPC with sublinear communication complexity
- Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round
- Black-box transformations from passive to covert security with public verifiability
- Efficient constant-round MPC with identifiable abort and public verifiability
- Secure computation with low communication from cross-checking
- Fluid MPC: secure multiparty computation with dynamic participants
- Game-theoretic fairness meets multi-party protocols: the case of leader election
- Efficient one-sided adaptively secure computation
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
- On Adaptively Secure Multiparty Computation with a Short CRS
- One-way functions imply secure computation in a quantum world
- Constant-round black-box construction of composable multi-party computation protocol
- Round-optimal black-box two-party computation
- Round-efficient Byzantine agreement and multi-party computation with asynchronous fallback
- Round-optimal secure multi-party computation
- Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party
- Secure multiparty computation with free branching
This page was built for publication: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451037)