High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority

From MaRDI portal
Publication:5738976

DOI10.1007/978-3-319-56614-6_8zbMath1415.94431OpenAlexW2614104334MaRDI QIDQ5738976

Yehuda Lindell, Ariel Nof, Or Weinstein, Jun Furukawa

Publication date: 13 June 2017

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-56614-6_8




Related Items (23)

Secure fast evaluation of iterative methods: with an application to secure PageRankOblivious TLS via multi-party computationATLAS: efficient and scalable MPC in the honest majority settingTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeAn efficient structural attack on NIST submission DAGSHonest majority MPC with abort with minimal online communicationHigh throughput secure MPC over small population in hybrid networks (extended abstract)CNF-FSS and Its ApplicationsSecureBiNN: 3-party secure computation for binarized neural network inferenceHigh-throughput secure three-party computation with an honest majorityMPClan: protocol suite for privacy-conscious computationsAmortizing division and exponentiationAttaining GOD beyond honest majority with friends and foesManticore: a framework for efficient multiparty computation supporting real number and Boolean arithmeticSecure computation with low communication from cross-checkingConcretely efficient large-scale MPC with active security (or tinykeys for tinyot)Yet another compiler for active security or: efficient MPC over arbitrary ringsOn the exact round complexity of secure three-party computationLow cost constant round MPC combining BMR and oblivious transferMon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)Guaranteed output delivery comes free in honest majority MPCImproved primitives for MPC over mixed arithmetic-binary circuitsAn efficient passive-to-active compiler for honest-majority MPC over rings



Cites Work


This page was built for publication: High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority