The study of minimal cryptographic primitives needed to implement secure computation among two or more players is a fundamental question in cryptography. The issue of complete primitives for the case of two players has been thoroughly studied. However, in the multi-party setting, when there are n > 2 players and t of them are corrupted, the question of what are the simplest complete primitives remained open for t ≥ n/3. (A primitive is called complete if any computation can be carried out by the players having access only to the primitive and local computation.) In this paper we consider this question, and introduce complete primitives of minimal cardinality for secure multi-party computation. The cardinality issue (number of players access...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
A fundamental problem in the theory of secure multi-party computation (MPC) is to characterize funct...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
Since Kilian showed in 1988 that oblivious transfer (OT) is complete in the sense that every secure ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
The growing influence of the Internet and other communication networks on our daily lives and on the...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This thesis contributes two results to the research area of secure two-party computation. The first ...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
A fundamental problem in the theory of secure multi-party computation (MPC) is to characterize funct...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
Since Kilian showed in 1988 that oblivious transfer (OT) is complete in the sense that every secure ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
The growing influence of the Internet and other communication networks on our daily lives and on the...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This thesis contributes two results to the research area of secure two-party computation. The first ...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
A fundamental problem in the theory of secure multi-party computation (MPC) is to characterize funct...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...