Scapi: The secure computation application programming interface

Y Ejgenberg, M Farbstein, M Levy… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Secure two-party and multiparty computation has long stood at the center of the foundations
of theoretical cryptography. Recently, however, interest has grown regarding the efficiency of …

From fairness to full security in multiparty computation

R Cohen, I Haitner, E Omri, L Rotem - Journal of Cryptology, 2022 - Springer
In the setting of secure multiparty computation (MPC), a set of mutually distrusting parties
wish to jointly compute a function, while guaranteeing the privacy of their inputs and the …

Secure and fair two-party computation

MS Kiraz - 2008 - research.tue.nl
Consider several parties that do not trust each other, yet they wish to correctly compute
some common function of their local inputs while keeping these inputs private. This problem …

Secure distributed human computation

C Gentry, Z Ramzan, S Stubblebine - … of the 6th ACM conference on …, 2005 - dl.acm.org
This paper is a preliminary exploration of secure distributed human computation. We
consider the general paradigm of using large-scale distributed computation to solve difficult …

ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing

K Zhou, MH Afifi, J Ren - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Discrete exponential operation, such as modular exponentiation and scalar multiplication on
elliptic curves, is a basic operation of many public-key cryptosystems. However, the …

Equivocating yao: constant-round adaptively secure multiparty computation in the plain model

R Canetti, O Poburinnaya… - Proceedings of the 49th …, 2017 - dl.acm.org
Yao's circuit garbling scheme is one of the basic building blocks of cryptographic protocol
design. Originally designed to enable two-message, two-party secure computation, the …

On combining privacy with guaranteed output delivery in secure multiparty computation

Y Ishai, E Kushilevitz, Y Lindell, E Petrank - Advances in Cryptology …, 2006 - Springer
In the setting of multiparty computation, a set of parties wish to jointly compute a function of
their inputs, while preserving security in the case that some subset of them are corrupted …

Characterization of secure multiparty computation without broadcast

R Cohen, I Haitner, E Omri, L Rotem - Journal of Cryptology, 2018 - Springer
A major challenge in the study of cryptography is characterizing the necessary and sufficient
assumptions required to carry out a given cryptographic task. The focus of this work is the …

Commodity-based 2PC for arithmetic circuits

I Damgård, H Haagh, M Nielsen, C Orlandi - Cryptography and Coding …, 2019 - Springer
We revisit the framework of Commodity-based Cryptography presented by Beaver
(STOC'97) with a focus on updating the framework to fit with modern multiparty computation …

[PDF][PDF] Applying secure multi-party computation in practice

R Talviste - Ph. D. dissertation, 2016 - core.ac.uk
Already in ancient Greece, the Spartans were worried about the privacy of their messages
during military conflicts and used a transposition cipher (scytale) to render their messages …