We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any t<n2$t < \frac{n}{2}$ inputs) and has subexponential complexity of construction based on coloring of planar graphs. More specifically, following the result of Desmedt et al. (2012) that the problem of MPC over non-Abelian groups can be reduced to finding a t-reliable n-coloring of planar graphs, we show the construction of such a graph which allows a path from the input nodes to the output nodes when any t-party subset is in the possession of the adversary. Unlike the deterministic construction...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
We present the first general protocol for secure multiparty computation in which the total amount of...
Abstract. We show the first deterministic construction of an uncondi-tionally secure multiparty comp...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Most previous work on unconditionally secure multiparty computation has focused on computing over a ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
We put forward a new approach for the design of efficient multiparty protocols: 1. Design a protocol...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
We present the first general protocol for secure multiparty computation in which the total amount of...
Abstract. We show the first deterministic construction of an uncondi-tionally secure multiparty comp...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Most previous work on unconditionally secure multiparty computation has focused on computing over a ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
We put forward a new approach for the design of efficient multiparty protocols: 1. Design a protocol...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
We present the first general protocol for secure multiparty computation in which the total amount of...