Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n parties to securely compute an agreed function F over a finite field F, even if t parties are under the control of a computationally unbounded active adversary. Asynchronous MPC (AMPC) is an important variant of MPC, which works over an asynchronous network. It is well known that perfect AMPC is possible if and only if n ≥ 4t + 1, while statistical AMPC is possible if and only if n ≥ 3t + 1. In this paper, we study the communication complexity of AMPC protocols (both statistical and perfect) designed with exactly n = 4t+ 1 parties. Our major contributions in this paper are as follows: 1. Asynchronous Verifiable Secret Sharing (AVSS) is one of the...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MP...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Carried out among n parties At most t parties can be actively corrupted by a computationally unboun...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
We then show an impossibility result indicating that asimilar equivalence does not hold for Multipar...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MP...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
Carried out among n parties At most t parties can be actively corrupted by a computationally unboun...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
We then show an impossibility result indicating that asimilar equivalence does not hold for Multipar...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...