Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually dis-trustful players to perform correct, distributed computa-tions under the sole assumption that some number of them will follow the protocol honestly. This paper investigates how much trust is necessary – that is, how many play-ers must remain honest – in order for distributed quantum computations to be possible. We present a verifiable quantum secret sharing (VQSS) protocol, and a general secure multiparty quantum com-putation (MPQC) protocol, which can tolerate any!n−12 " cheaters among n players. Previous protocols for these tasks tolerated!n−14 " and!n−16 " ...
We consider the task of secure multiparty distributed quantum computation on a quantum network. We p...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
I construct a secure multiparty scheme to compute a classical function by a succinct use of a specia...
It is a standard result in the theory of quantum error-correcting codes that no code of length n can...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
A recent result by Dulek et al. (EUROCRYPT 2020) showed a secure protocol for computing any quantum ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider the task of secure multiparty distributed quantum computation on a quantum network. We p...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
I construct a secure multiparty scheme to compute a classical function by a succinct use of a specia...
It is a standard result in the theory of quantum error-correcting codes that no code of length n can...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
A recent result by Dulek et al. (EUROCRYPT 2020) showed a secure protocol for computing any quantum ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
We consider the task of secure multiparty distributed quantum computation on a quantum network. We p...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...