Abstract. Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted parties is below a certain threshold, these protocols provide all specified security guarantees. Beyond this threshold, they provide no security guarantees at all. Furthermore, most previous protocols achieve either information-theoretic (IT) security, in which case this threshold is low, or they achieve only computational security, in which case this threshold is high. In contrast, a hybrid-secure proto-col provides different security guarantees depending on the set of corrupted parties and the com-putational power of the adversary, without being aware o...
With the rapid development of secure multi-party computation (MPC) over past decades, applications o...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We reconsider the security guarantee that can be achieved by general protocols for secure multiparty...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, p...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation ...
Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible ...
Secure multi-party computation (MPC) is a cryptographic primitive for computing on private data. MPC...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
With the rapid development of secure multi-party computation (MPC) over past decades, applications o...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We reconsider the security guarantee that can be achieved by general protocols for secure multiparty...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, p...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation ...
Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible ...
Secure multi-party computation (MPC) is a cryptographic primitive for computing on private data. MPC...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
With the rapid development of secure multi-party computation (MPC) over past decades, applications o...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...