Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
From MaRDI portal
Publication:6155260
DOI10.1007/978-3-031-15802-5_13zbMATH Open1516.94041MaRDI QIDQ6155260FDOQ6155260
Authors: Huijia Lin, Tianren Liu
Publication date: 12 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Recommendations
- Information-theoretic 2-round MPC without round collapsing: adaptive security, and more
- Two-round MPC: information-theoretic and black-box
- Low cost constant round MPC combining BMR and oblivious transfer
- Two-round multiparty secure computation from minimal assumptions
- Round-optimal secure multiparty computation with honest majority
Cites Work
- Multiparty Computation from Somewhat Homomorphic Encryption
- Title not available (Why is that?)
- Founding Cryptography on Oblivious Transfer – Efficiently
- Advances in Cryptology - CRYPTO 2003
- Multiparty computation with low communication, computation and interaction via threshold FHE
- A minimal model for secure computation (extended abstract)
- Title not available (Why is that?)
- Succinct non-interactive arguments via linear interactive proofs
- Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
- Adaptively secure, universally composable, multiparty computation in constant rounds
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Title not available (Why is that?)
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Two-round MPC: information-theoretic and black-box
- Perfect secure computation in two rounds
- Two-round adaptively secure multiparty computation from standard assumptions
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- On the round complexity of black-box secure MPC
- Lattice-based fully dynamic multi-key FHE with short ciphertexts
- Multi-key FHE from LWE, revisited
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- Secure computation with minimal interaction, revisited
- Multi-identity and multi-key leveled FHE from learning with errors
- Secure multiparty computation with minimal interaction
- Foundations of homomorphic secret sharing
- Two round multiparty computation via multi-key FHE
- Two-round secure MPC from indistinguishability obfuscation
- Efficient constant round multi-party computation combining BMR and SPDZ
- Reusable non-interactive secure computation
- Title not available (Why is that?)
- Multi-key fully-homomorphic encryption in the plain model
- Efficient pseudorandom correlation generators from ring-LPN
- Reusable two-round MPC from DDH
- Efficient pseudorandom correlation generators: silent OT extension and more
- Information-theoretic 2-round MPC without round collapsing: adaptive security, and more
- Degree 2 is complete for the round-complexity of malicious MPC
Cited In (1)
This page was built for publication: Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6155260)