The Exact Round Complexity of Secure Computation

From MaRDI portal
Publication:5739211

DOI10.1007/978-3-662-49896-5_16zbMath1371.94637OpenAlexW2495293033MaRDI QIDQ5739211

Antigoni Polychroniadou, Pratyay Mukherjee, Omkant Pandey, Sanjam Garg

Publication date: 15 July 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_16




Related Items

On the round complexity of secure quantum computationOn the round complexity of black-box secure MPCRound optimal black-box ``commit-and-proveComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityMore Efficient Constant-Round Multi-party Computation from BMR and SHERound-optimal and communication-efficient multiparty computationRound-optimal multi-party computation with identifiable abortA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementFrom FE combiners to secure MPC and backMaliciously-secure MrNISC in the plain modelStatistical security in two-party computation revisitedRound-optimal black-box secure computation from two-round malicious OTKnowledge encryption and its applications to simulatable protocols with low round-complexityA new approach to efficient non-malleable zero-knowledgeBest of both worlds. Revisiting the spymasters double agent problemRound-optimal black-box MPC in the plain modelReusable secure computation in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingOn the exact round complexity of best-of-both-worlds multi-party computationBlockchains enable non-interactive MPCOblivious transfer from trapdoor permutations in minimal roundsOn the Exact Round Complexity of Self-composable Two-Party ComputationWhat security can we achieve within 4 rounds?On the exact round complexity of secure three-party computationRound-optimal secure multi-party computationOn the enumeration of minimal non-pairwise compatibility graphsPost-quantum multi-party computationThe Feasibility of Outsourced Database Search in the Plain ModelWhat Security Can We Achieve Within 4 Rounds?Concurrent Non-Malleable Commitments (and More) in 3 RoundsSuccinct non-interactive secure computation