In this paper we are interested in efficient and secure constant round multi-party protocols which provide unconditional security against so called honest-but-curious adversaries. In particular, we design a novel constant round protocol that converts from shares over Z_q to shares over the integers working for all shared inputs from Z_q. Furthermore, we present a constant round protocol to securely evaluate a shared input on a public polynomial whose running time is linear in the degree of the polynomial. The proposed solution makes use of Chebyshev Polynomials. We show that the latter two protocols can be used to design efficient constant round protocols for the following natural problems: (i) Equality: Computing shares of the bit indicati...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
In this work we continue the study on the round complexity of secure two-party computation with blac...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. We present the first general MPC protocol that satisfies the following: (1) the con-struct...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
In this work we continue the study on the round complexity of secure two-party computation with blac...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. We present the first general MPC protocol that satisfies the following: (1) the con-struct...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
In this work we continue the study on the round complexity of secure two-party computation with blac...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...