Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic three-party protocols that tolerate a single, semi-honest corrupt party, since these protocols enjoy very high efficiency. We propose a new approach for secure three-party computation (3PC) that improves security while maintaining practical efficiency that is competitive with traditional information-theoretic protocols. Our protocol is based on garbled circuits and provides security against a single, malicious corrupt party. Unlike information-theoretic 3PC protocols, ours uses a constant number of rounds. Our protocol only uses inexpensive symmetric-key cryptography: hash functions, block ciphers, pseudorandom generators (in particular, no ...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
Abstract. We consider secure two-party computation in a multiple-execution setting, where two partie...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
Abstract. We consider secure two-party computation in a multiple-execution setting, where two partie...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...