Multiparty computation (MPC) over rings such as Z232 or Z264 has received a great deal of attention recently due to its ease of implementation and attractive performance. Several actively secure protocols over these rings have been implemented, for both the dishonest majority setting and the setting of three parties with one corruption. However, in the honest majority setting, no concretely efficient protocol for arithmetic computation over rings has yet been proposed that allows for an arbitrary number of parties. We present a novel compiler for MPC over the ring Z2k in the honest majority setting that turns a semi-honest protocol into an actively secure protocol with very little overhead. The communication cost per multiplication is only ...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Abstract. Recently, there has been huge progress in the field of con-cretely efficient secure comput...
Multiparty computation (MPC) over rings such as Z232 or Z264 has received a great deal of attention ...
We present a very simple yet very powerful idea for turning any passively secure MPC protocol into a...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Multiparty computation protocols have been known for more than twenty years now, but due to their la...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with...
Secure multiparty computation (MPC) allows a set of mutually distrustful parties to compute a public...
Most multi-party computation protocols allow secure computation of arithmetic circuits over a finite...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Abstract. Recently, there has been huge progress in the field of con-cretely efficient secure comput...
Multiparty computation (MPC) over rings such as Z232 or Z264 has received a great deal of attention ...
We present a very simple yet very powerful idea for turning any passively secure MPC protocol into a...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Multiparty computation protocols have been known for more than twenty years now, but due to their la...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with...
Secure multiparty computation (MPC) allows a set of mutually distrustful parties to compute a public...
Most multi-party computation protocols allow secure computation of arithmetic circuits over a finite...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Abstract. Recently, there has been huge progress in the field of con-cretely efficient secure comput...