Robust pseudorandom generators

Y Ishai, E Kushilevitz, X Li, R Ostrovsky… - … , and Programming: 40th …, 2013 - Springer
Abstract Let G:{0, 1} n→{0, 1} m be a pseudorandom generator. We say that a circuit
implementation of G is (k, q)-robust if for every set S of at most k wires anywhere in the …

Must the communication graph of MPC protocols be an expander?

E Boyle, R Cohen, D Data, P Hubáček - Journal of Cryptology, 2023 - Springer
Secure multiparty computation (MPC) on incomplete communication networks has been
studied within two primary models:(1) where a partial network is fixed a priori, and thus …

Exploring the boundaries of topology-hiding computation

M Ball, E Boyle, T Malkin, T Moran - … on the Theory and Applications of …, 2018 - Springer
Topology-hiding computation (THC) is a form of multi-party computation over an incomplete
communication graph that maintains the privacy of the underlying graph topology. In a line of …

Communications in unknown networks: Preserving the secret of topology

M Hinkelmann, A Jakoby - Theoretical computer science, 2007 - Elsevier
In cryptography we investigate security aspects of data distributed in a network. This kind of
security does not protect the secrecy of the network topology against being discovered if …

Is information-theoretic topology-hiding computation possible?

M Ball, E Boyle, R Cohen, T Malkin, T Moran - Theory of Cryptography …, 2019 - Springer
Topology-hiding computation (THC) is a form of multi-party computation over an incomplete
communication graph that maintains the privacy of the underlying graph topology. Existing …

Practical private information aggregation in large networks

G Kreitz, M Dam, D Wikström - … for Applications: 15th Nordic Conference on …, 2012 - Springer
Emerging approaches to network monitoring involve large numbers of agents collaborating
to produce performance or security related statistics on huge, partial mesh networks. The …

Private computations in networks: Topology versus randomness

A Jakoby, M Liśkiewicz, R Reischuk - … 27–March 1, 2003 Proceedings 20, 2003 - Springer
In a distributed network, computing a function privately requires that no participant gains any
additional knowledge other than the value of the function. We study this problem for …

On private computation in incomplete networks

A Beimel - Distributed Computing, 2007 - Springer
Suppose that some parties are connected by an incomplete network of reliable and private
channels. The parties cooperate to execute some protocol. However, the parties are curious …

Lower Bounds on the Amount of Randomness in 2-Private Computation

A Gál, A Rosén - SIAM Journal on Computing, 2005 - SIAM
We consider the amount of randomness necessary in information-theoretic private protocols.
We prove that at least Ω(\logn) random bits are necessary for the t-private computation of the …

Interactive secure function computation

D Data, GR Kurri, J Ravi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider interactive computation of randomized functions between two users with the
following privacy requirement: the interaction should not reveal to either user any extra …