Characterization of secure multiparty computation without broadcast

R Cohen, I Haitner, E Omri, L Rotem - Journal of Cryptology, 2018 - Springer
A major challenge in the study of cryptography is characterizing the necessary and sufficient
assumptions required to carry out a given cryptographic task. The focus of this work is the …

Faster secure two-party computation in the single-execution setting

X Wang, AJ Malozemoff, J Katz - … on the theory and applications of …, 2017 - Springer
We propose a new protocol for two-party computation, secure against malicious adversaries,
that is significantly faster than prior work in the single-execution setting (ie, non-amortized …

[PDF][PDF] Adaptively secure multi-party computation

R Canetti, U Feige, O Goldreich, M Naor - Proceedings of the twenty …, 1996 - dl.acm.org
A fundamental problem in designing secure multi-party protocols is how to deal with
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …

New constructions for UC secure computation using tamper-proof hardware

N Chandran, V Goyal, A Sahai - … on the Theory and Applications of …, 2008 - Springer
Abstract The Universal Composability framework was introduced by Canetti to study the
security of protocols which are concurrently executed with other protocols in a network …

[PDF][PDF] Applying secure multi-party computation in practice

R Talviste - Ph. D. dissertation, 2016 - core.ac.uk
Already in ancient Greece, the Spartans were worried about the privacy of their messages
during military conflicts and used a transposition cipher (scytale) to render their messages …

[图书][B] Secure multi-party computation

MM Prabhakaran, A Sahai - 2013 - books.google.com
Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by
modern cryptography: it facilitates collaboration among mutually distrusting parties by …

Secure two-party computation with low communication

I Damgård, S Faust, C Hazay - Theory of Cryptography Conference, 2012 - Springer
We propose a 2-party UC-secure protocol that can compute any function securely. The
protocol requires only two messages, communication that is poly-logarithmic in the size of …

[PDF][PDF] Incentive engineering for outsourced computation in the face of collusion

MHR Khouzani, V Pham, C Cid - Proceedings of WEIS, 2014 - econinfosec.org
One of the major security concerns in outsourced computation is whether the computation is
performed honestly. Although cryptographically verifiable computation promises (almost) …

Verifiable outsourced computation with full delegation

Q Wang, F Zhou, S Peng, Z Xu - … November 15-17, 2018, Proceedings, Part …, 2018 - Springer
With the development of cloud computing, verifiable computation (VC) has attracted
considerable attentions due to its importance. However, the existing VC schemes suffer from …

Two-party computing with encrypted data

SG Choi, A Elbaz, A Juels, T Malkin, M Yung - Advances in Cryptology …, 2007 - Springer
We consider a new model for online secure computation on encrypted inputs in the
presence of malicious adversaries. The inputs are independent of the circuit computed in the …