We propose an efficient protocol for the evaluation of functions getting their inputs from multiple parties in a way that guarantees the result correctness. In our setting, a worker is trusted with the confidentiality of the inputs and, given this assumption, our protocol guarantees perfect privacy to the clients. Our protocol offers an interesting middle ground between traditional verifiable computation protocols, that usually do not come with privacy guarantees and focus on one or a small number of clients, and secure multi-party computation protocol that distribute the privacy trust between a number of parties, at the cost of much more expensive protocols(especially for NP functions and functions that do not admit an efficient static cir...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
For many applications of secure multiparty computation it is natural to demand that the output of th...
This thesis sets as goal the study and development of cryptographic multi-party protocols offering t...
Abstract—The existing work on distributed secure multi-party computation, e.g., set operations, dot ...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract. In the last few years the efficiency of secure multi-party computation (MPC) increased in ...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC) in which a...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
We consider the problem of delegating computations, in which a client may outsource the computation ...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
Abstract. There are protocols to privately evaluate any function in the passive (honest-but-curious)...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
For many applications of secure multiparty computation it is natural to demand that the output of th...
This thesis sets as goal the study and development of cryptographic multi-party protocols offering t...
Abstract—The existing work on distributed secure multi-party computation, e.g., set operations, dot ...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract. In the last few years the efficiency of secure multi-party computation (MPC) increased in ...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC) in which a...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
We consider the problem of delegating computations, in which a client may outsource the computation ...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
Abstract. There are protocols to privately evaluate any function in the passive (honest-but-curious)...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
For many applications of secure multiparty computation it is natural to demand that the output of th...