Two Round Multiparty Computation via Multi-key FHE

From MaRDI portal
Publication:5739221

DOI10.1007/978-3-662-49896-5_26zbMath1351.94060OpenAlexW2499340481MaRDI QIDQ5739221

Pratyay Mukherjee, Daniel Wichs

Publication date: 15 July 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_26




Related Items (73)

YOSO: You only speak once. Secure MPC with stateless ephemeral rolesThree-round secure multiparty computation from black-box two-round oblivious transferTwo-round MPC: information-theoretic and black-boxTwo-round adaptively secure multiparty computation from standard assumptionsMulti-key FHE from LWE, RevisitedTargeted Homomorphic Attribute-Based EncryptionAn improved affine equivalence algorithm for random permutationsRound-optimal and communication-efficient multiparty computationIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsToward non-interactive zero-knowledge proofs for NP from LWEReusable Two-Round MPC from LPNFrom FE combiners to secure MPC and backLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesMulti-key and multi-input predicate encryption from learning with errorsEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionMulti-key Homomorphic Proxy Re-EncryptionStatistical security in two-party computation revisitedmrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulusMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingFunctional encryption with secure key leasingScooby: improved multi-party homomorphic secret sharing based on FHEMultikey Fully Homomorphic Encryption and ApplicationsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsMulti-input attribute based encryption and predicate encryptionMaliciously secure massively parallel computation for all-but-one corruptionsTwo-round adaptively secure MPC from isogenies, LPN, or CDHUnnamed ItemPrivacy preserving multi-party computation delegation for deep learning in cloud computingBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsScooby: improved multi-party homomorphic secret sharing based on FHEMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNToward practical privacy-preserving linear regressionOn the exact round complexity of best-of-both-worlds multi-party computationSecure MPC: laziness leads to GODSLAP: simpler, improved private stream aggregation from ring learning with errorsSecure quantum computation with classical communicationBlockchains enable non-interactive MPCSuccinct LWE sampling, random polynomials, and obfuscationMaliciously circuit-private multi-key FHE and MPC based on LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedFoundations of Homomorphic Secret SharingA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEChosen-Ciphertext Secure Fully Homomorphic EncryptionPrivate Puncturable PRFs from Standard Lattice AssumptionsGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationBeyond honest majority: the round complexity of fair and robust multi-party computationYet another compiler for active security or: efficient MPC over arbitrary ringsWatermarking cryptographic functionalities from standard lattice assumptionsOn the exact round complexity of secure three-party computationRound-optimal secure multi-party computationMulti-theorem preprocessing NIZKs from latticesRound-preserving parallel composition of probabilistic-termination cryptographic protocolsOn the enumeration of minimal non-pairwise compatibility graphsCombiners for functional encryption, unconditionallyAdaptively secure MPC with sublinear communication complexityPost-quantum multi-party computationMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsCandidate obfuscation via oblivious LWE samplingTowards accountability in CRS generationBETA: biometric-enabled threshold authenticationUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionSpooky Encryption and Its ApplicationsProbabilistic Termination and Composability of Cryptographic ProtocolsProbabilistic termination and composability of cryptographic protocolsLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsBreaking the Circuit Size Barrier for Secure Computation Under DDHReverse firewalls for actively secure MPCsTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSUnnamed ItemHomomorphic EncryptionBroadcast-optimal two-round MPC




This page was built for publication: Two Round Multiparty Computation via Multi-key FHE