Abstract. There are protocols to privately evaluate any function in the passive (honest-but-curious) setting assuming that the honest nodes are in majority. For some specific functions, protocols are known which remain secure even without an honest majority. The seminal work by Chor and Kushilevitz [7] gave a complete characterization of Boolean functions, showing that each Boolean function either requires an honest majority, or is such that it can be privately evaluated regardless of the number of colluding nodes. The problem of discovering the threshold for secure evaluation of more general functions remains an open problem. Towards a resolution, we pro-vide a complete characterization of the security threshold for functions with three di...
We study the following two related questions: - What are the minimal computational resources require...
A function f is computationally securely computable if two computationally-bounded parties Alice, ha...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
The well known impossibility result of Cleve (STOC 1986) implies that in general it is impossible to...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
We use security in the Universal Composition framework as a means to study the “cryp-tographic compl...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Fairness is a desirable property in secure computation; informally it means that if one party gets t...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
We define a new type cryptographical model called secure multi-party proof that allows any t players...
We propose an efficient protocol for the evaluation of functions getting their inputs from multiple ...
Secure computation is the computation of a function over private inputs. In the general setting, par...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
We study the following two related questions: - What are the minimal computational resources require...
A function f is computationally securely computable if two computationally-bounded parties Alice, ha...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
The well known impossibility result of Cleve (STOC 1986) implies that in general it is impossible to...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
We use security in the Universal Composition framework as a means to study the “cryp-tographic compl...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Fairness is a desirable property in secure computation; informally it means that if one party gets t...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
We define a new type cryptographical model called secure multi-party proof that allows any t players...
We propose an efficient protocol for the evaluation of functions getting their inputs from multiple ...
Secure computation is the computation of a function over private inputs. In the general setting, par...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
We study the following two related questions: - What are the minimal computational resources require...
A function f is computationally securely computable if two computationally-bounded parties Alice, ha...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...