We revisit the problem of universally composable (UC) secure multiparty computation in the stateless hardware token model. We construct a three round multi-party computation protocol for general functions based on one-way functions where each party sends two tokens to every other party. Relaxing to the two-party case, we also construct a two round protocol based on one-way functions where each party sends a single token to the other party, and at the end of the protocol, both parties learn the output.One of the key components in the above constructions is a new two-round oblivious transfer protocol based on one-way functions using only one token, which can be reused an unbounded polynomial number of times. All prior constructions required e...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware token...
In this paper, we present a simpler and more restricted variant of the universally composable securi...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware token...
In this paper, we present a simpler and more restricted variant of the universally composable securi...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...