Abstract. In TCC 2006, Garay et al. introduced the notion of "commit-prove-fair-open" functionality in order to achieve what they called "resource fairness " of secure multi-party computation(MPC) with corrupted majority. The protocol realizing this notion of fairness follows the gradual release approach and, further, it can be proven secure in the simulation paradigm and enjoys composition properties. In this paper, we show a more efficient resource-fair protocol of FCPFO based on a new variant of Garay et al. time-lines and simplified Camenisch-Shoup(sCS) commitment,whose communication and computation complexity are less than 1/5 of Garay et al. construction. In addition, our new protocol allows commitment to value 0, ...
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing...
When we design a security protocol we assume that the humans (or organizations) playing Alice and Bo...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
We introduce the notion of {\em resource-fair} protocols. Informally, this property states that if o...
We study the round complexity of multiparty computation with fairness and guaranteed output delivery...
Secure two-party computation cannot be fair in general against malicious adversaries, unless a trust...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
International audienceWe describe a new protocol to achieve two party ε-fair exchange: at any point ...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
International audienceA fair distributed protocol ensures that dishonest parties have no advantage o...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, cele...
Abstract. We propose a new security measure for commitment pro-tocols, called Universally Composable...
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing...
When we design a security protocol we assume that the humans (or organizations) playing Alice and Bo...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
We introduce the notion of {\em resource-fair} protocols. Informally, this property states that if o...
We study the round complexity of multiparty computation with fairness and guaranteed output delivery...
Secure two-party computation cannot be fair in general against malicious adversaries, unless a trust...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
International audienceWe describe a new protocol to achieve two party ε-fair exchange: at any point ...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
International audienceA fair distributed protocol ensures that dishonest parties have no advantage o...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, cele...
Abstract. We propose a new security measure for commitment pro-tocols, called Universally Composable...
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing...
When we design a security protocol we assume that the humans (or organizations) playing Alice and Bo...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...