Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalability, load-balancing issues, trusted party assumptions, and/or weak security guarantees. In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced. In particular, we require each party to send only a polylogarithmic number of bits and perform a polylog...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
In this work we continue the study on the round complexity of secure two-party computation with blac...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
In this paper, we revisit the problem of secure shuffling in a three-server setting with an honest m...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
We devise multi-party computation protocols for general secure function evaluation with the property...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We define a new type cryptographical model called secure multi-party proof that allows any t players...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
In this work we continue the study on the round complexity of secure two-party computation with blac...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
In this paper, we revisit the problem of secure shuffling in a three-server setting with an honest m...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
We devise multi-party computation protocols for general secure function evaluation with the property...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We define a new type cryptographical model called secure multi-party proof that allows any t players...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
We consider the round complexity of multi-party computation in the presence of a static adversary wh...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
In this work we continue the study on the round complexity of secure two-party computation with blac...