Copyright © 2015 ACM. The vast majority of works on secure multi-party computation (MPC) assume a full communication pattern: every party exchanges messages with all the network participants over a complete network of point-to-point channels. This can be problematic in modern large scale networks, where the number of parties can be of the order of millions, as for example when computing on large distributed data. Motivated by the above observation, Boyle, Goldwasser, and Tessaro [TCC 2013] recently put forward the notion of communication locality, namely, the total number of pointto- point channels that each party uses in the protocol, as a quality metric of MPC protocols. They proved that assuming a public-key infrastructure (PKI) and a co...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract. We give improved upper bounds on the communication com-plexity of optimally-resilient secu...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
We devise multi-party computation protocols for general secure function evaluation with the property...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
There has been a tremendous growth in the size of distributed systems in the past three decades. Tod...
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract. We give improved upper bounds on the communication com-plexity of optimally-resilient secu...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
We devise multi-party computation protocols for general secure function evaluation with the property...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
There has been a tremendous growth in the size of distributed systems in the past three decades. Tod...
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract. We give improved upper bounds on the communication com-plexity of optimally-resilient secu...