We devise multi-party computation protocols for general secure function evaluation with the property that each party is only required to communicate with a small number of dynamically chosen parties. More explicitly, starting with n parties connected via a complete and synchronous network, our protocol requires each party to send messages to (and process messages from) at most polylog(n) other parties using polylog(n) rounds. It achieves secure computation of any polynomial-time computable randomized function f under cryptographic assumptions, and tolerates up to statically scheduled Byzantine faults. We then focus on the particularly interesting setting in which the function to be computed is a sublinear algorithm: An evaluation of f depen...
Secure computation enables mutually distrusting parties to jointly compute a function on their secre...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the following two related questions: - What are the minimal computational resources require...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Copyright © 2015 ACM. The vast majority of works on secure multi-party computation (MPC) assume a fu...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Secure computation enables mutually distrusting parties to jointly compute a function on their secre...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the following two related questions: - What are the minimal computational resources require...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Copyright © 2015 ACM. The vast majority of works on secure multi-party computation (MPC) assume a fu...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Secure computation enables mutually distrusting parties to jointly compute a function on their secre...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the following two related questions: - What are the minimal computational resources require...