Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to “denial of service ” attacks, allowing even a single malicious party to force the protocol to abort. In this work, we initiate a systematic study of the more robust notion of security with identifiable abort, which leverages the effect of an abort by forcing, upon abort, at least one malicious party to reveal its identity. We present the first information-theoretic MPC protocol which is secure with identifiable abort (in short ID-MPC) using a correlated randomness setup. This complements a negative result of Ishai et al. (TCC 2012) which rules out information-theoretic ID-MPC in the OT-hybrid model, thereby showing that pairwise correlated...
Abstract. Secure multi-party computation (MPC) deals with the prob-lem of shared computation between...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure multi-party computation (MPC) protocols that are resilient to a dishonest majority allow the ...
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort again...
Cheater identification in secure multi-party computation (MPC) allows the honest parties to agree up...
We present fundamental (in-)feasibility results for the strongest security notion for Secure Multi-P...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting whe...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. Most protocols for distributed, fault-tolerant computation, or multi-party computation (MP...
In the setting of multiparty computation a set of parties with private inputs wish to compute some j...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Abstract. Secure multi-party computation (MPC) deals with the prob-lem of shared computation between...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure multi-party computation (MPC) protocols that are resilient to a dishonest majority allow the ...
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort again...
Cheater identification in secure multi-party computation (MPC) allows the honest parties to agree up...
We present fundamental (in-)feasibility results for the strongest security notion for Secure Multi-P...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting whe...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. Most protocols for distributed, fault-tolerant computation, or multi-party computation (MP...
In the setting of multiparty computation a set of parties with private inputs wish to compute some j...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Abstract. Secure multi-party computation (MPC) deals with the prob-lem of shared computation between...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...