Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, namely, security against covert adversaries. The main motivation was to obtain secure computation protocols which are efficient enough to be usable in practice. Aumann and Lindell presented an efficient two party computation protocol secure against covert adversaries. They were able to utilize cut and choose techniques rather than relying on expensive zero knowledge proofs. In this paper, we design an efficient multi-party computation protocol in the covert adversary model which remains secure even if a majority of the parties are dishonest. We also substan-tially improve the two-party protocol of Aumann and Lindell. Our protocols avoid general N...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...