This document presents two novel techniques for Multi-Party Computation based on secret sharing where the objects of computation are square matrices over a finite field. Matrix Triples can be consumed during the evaluation phase to obtain the product of two matrices, and they have quadratic space complexity, which makes them more efficient for this purpose than ordinary multiplication triples. Matrix Power Tuples are costly to produce during the preprocessing phase but allow the parties to take a matrix to a power with just a single round of communication during the evaluation phase. The latter technique also has a considerably simpler and cheaper variant that can be applied in cases where multiplication is commutative. We provide a bottom...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
With the advent of the information age, the network security is particularly important. The secure m...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
In a data-driven society, individuals and companies encounter numerous situations where private info...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Abstract. The general secure multi-party computation problem is when multiple parties (say, Alice an...
Secure multi-party computation (MPC) is a subfield of cryptography that aims at designing protocols ...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
With the advent of the information age, the network security is particularly important. The secure m...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
In a data-driven society, individuals and companies encounter numerous situations where private info...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Abstract. The general secure multi-party computation problem is when multiple parties (say, Alice an...
Secure multi-party computation (MPC) is a subfield of cryptography that aims at designing protocols ...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
With the advent of the information age, the network security is particularly important. The secure m...