Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a synchronous communication setting; however, in an asynchronous communication setting, the resiliency bound decreases to only t < n/3 active corruptions. We improve the resiliency bound for asynchronous MPC (AMPC) to match synchronous MPC using non-equivocation. Non-equivocation is a message authentication mechanism to restrict a corrupted sender from mak-ing conflicting statements to different (honest) parties. It can be implemented using an increment-only counter and a digital signature oracle, realizable with trusted hardware modules readily available in com-modity computers and smartphone devices. A non-equivocation mechanism can also be...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying com...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MP...
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to e...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Abstract. We present a technique to achieve O(n) communication complexity per multiplication for a w...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Secure multiparty computation$~$(MPC) enables privacy-preserving collaborative computation over sens...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying com...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MP...
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to e...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Abstract. We present a technique to achieve O(n) communication complexity per multiplication for a w...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Secure multiparty computation$~$(MPC) enables privacy-preserving collaborative computation over sens...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying com...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...