Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to compute a function jointly on their inputs without revealing any information beyond the output. For many years, implementations of MPC protocols have targeted security against semi-honest adversaries, i.e., attackers are assumed to execute the protocol honestly but try to learn private information after the fact. Protocols secure against stronger and more realistic malicious adversaries, who could behave arbitrarily during the protocol execution, were known to exist but were much less efficient. This thesis introduces a new paradigm to construct extremely efficient MPC protocols with malicious security. In particular, this thesis consists of three...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
We present a runtime environment for executing secure programs via a multi-party computation protoco...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Secure Multi-party Computation (MPC) enables a set of parties to collaboratively compute, using cry...
Wang et al. (CCS 2017) recently proposed a protocol for malicious secure two-party computation that ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
In this dissertation, we consider the design of broadcast and secure multi-party computation (MPC) p...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
We present a runtime environment for executing secure programs via a multi-party computation protoco...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Secure Multi-party Computation (MPC) enables a set of parties to collaboratively compute, using cry...
Wang et al. (CCS 2017) recently proposed a protocol for malicious secure two-party computation that ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
In this dissertation, we consider the design of broadcast and secure multi-party computation (MPC) p...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...