Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary s...
We present a new multiparty computation protocol secure against a static and malicious dishonest maj...
Multiparty computation protocols have been known for more than twenty years now, but due to their la...
We study the following two related questions: - What are the minimal computational resources require...
We construct a general purpose secure multiparty computation protocol which remains secure under (a-...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
With the advent of the information age, the network security is particularly important. The secure m...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Abstract. We show the first deterministic construction of an uncondi-tionally secure multiparty comp...
We show the first deterministic construction of an unconditionally secure multiparty computation (MP...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
We present a new multiparty computation protocol secure against a static and malicious dishonest maj...
Multiparty computation protocols have been known for more than twenty years now, but due to their la...
We study the following two related questions: - What are the minimal computational resources require...
We construct a general purpose secure multiparty computation protocol which remains secure under (a-...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
With the advent of the information age, the network security is particularly important. The secure m...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Abstract. We show the first deterministic construction of an uncondi-tionally secure multiparty comp...
We show the first deterministic construction of an unconditionally secure multiparty computation (MP...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
We present a new multiparty computation protocol secure against a static and malicious dishonest maj...
Multiparty computation protocols have been known for more than twenty years now, but due to their la...
We study the following two related questions: - What are the minimal computational resources require...