Secure multi-party computation with identifiable abort

Y Ishai, R Ostrovsky, V Zikas - … in Cryptology–CRYPTO 2014: 34th Annual …, 2014 - Springer
… Protocols for secure multi-party computation (MPC) that resist a dishonest … to abort. In this
work, we initiate a systematic study of the more robust notion of security with identifiable abort, …

Constructing secure multi-party computation with identifiable abort

N Brandt, S Maier, T Müller… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Secure Multi-Party Computation (MPC) is a powerful notion that allows … security with
Identifiable Abort (IA) as formalized by Ishai, Ostrovsky, and Zikas [32] (see also [2, 31]). Here, abort

Round-optimal multi-party computation with identifiable abort

M Ciampi, D Ravi, L Siniscalchi, H Waldner - … International Conference on …, 2022 - Springer
Secure multi-party computation (MPC) protocols that are resilient to a dishonest majority …
output of the computation while, at the same time, forcing the honest parties to abort. Aumann …

Secure multiparty computation with identifiable abort via vindicating release

R Cohen, J Doerner, Y Kondi, A Shelat - Annual International Cryptology …, 2024 - Springer
… Their approach is based upon multi-party garbling [10, 63], and makes black-box use of a …
a weakened form of identifiable abort that we dub input-revealing identifiable abort (IRIA). We …

Efficient secure multiparty computation with identifiable abort

C Baum, E Orsini, P Scholl - … : 14th International Conference, TCC 2016-B …, 2016 - Springer
… We study secure multiparty computation (MPC) in the dishonest majority setting providing
security with identifiable abort, where if the protocol aborts, the honest parties can agree upon …

Round efficient secure multiparty quantum computation with identifiable abort

B Alon, H Chung, KM Chung, MY Huang, Y Lee… - Annual International …, 2021 - Springer
… an abort. We propose the first quantum protocol that admits security-with-identifiable-abort, …
on the identity of a corrupted party in case of an abort. Additionally, our protocol is the first to …

Secure Multiparty Computation with Identifiable Abort via Vindicating

R Cohen, J Doerner, Y Kondi¹… - Advances in Cryptology …, 2024 - books.google.com
… Their approach is based upon multi-party garbling [10, 63], and … secure multiparty computation
with identifiable abort (2020). … Complete fairness in multi-party computation without an …

Tight setup bounds for identifiable abort

N Brandt - Cryptology ePrint Archive, 2021 - eprint.iacr.org
security notion for Secure Multi-Party Computation (MPC) that is achievable when a majority
of parties is malicious, ie security with Identifiable Abort. As … protocols with Identifiable Abort. …

On sufficient oracles for secure computation with identifiable abort

M Simkin, L Siniscalchi, S Yakoubov - … on Security and Cryptography for …, 2022 - Springer
Identifiable abort is the strongest security guarantee that is achievable for secure multi-party
computation … Protocols that achieve this level of security ensure that, in case of an abort, all …

Secure Multiparty Computation with Identifiable Abort and Fairness

L Nie, SW Yao, J Liu - … Conference on Cryptography, Security …, 2023 - ieeexplore.ieee.org
… CONCLUSION We first construct a SPDZ-like protocol which supports identifiable abort or
… publicly verifiable secret sharing are employed to implement identifiable abort and fairness …