International audienceSecure multiparty computation (MPC) often relies on sources of correlated randomness for better efficiency and simplicity. This is particularly useful for MPC with no honest majority, where input-independent correlated randomness enables a lightweight "non-cryptographic" online phase once the inputs are known. However, since the amount of correlated randomness typically scales with the circuit size of the function being computed, securely generating correlated randomness forms an efficiency bottleneck, involving a large amount of communication and storage. A natural tool for addressing the above limitations is a pseudorandom correlation generator (PCG). A PCG allows two or more parties to securely generate long sources...
We study the problem of non-interactive multiparty computation (NI-MPC) where a group of completely ...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. A private-key cryptosystem may be viewed as a means by which a trusted dealer privately co...
International audienceSecure computation often benefits from the use of correlated randomness to ach...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceWe consider the problem of securely generating useful instances of two-party c...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
International audienceCorrelated secret randomness is a useful resource for many cryptographic appli...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Correlated oblivious transfer (COT) is a crucial building block for secure multi-party computation (...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
International audienceIn this work we introduce a new (circuit-dependent) homomorphic secret sharing...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We study the problem of non-interactive multiparty computation (NI-MPC) where a group of completely ...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. A private-key cryptosystem may be viewed as a means by which a trusted dealer privately co...
International audienceSecure computation often benefits from the use of correlated randomness to ach...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceWe consider the problem of securely generating useful instances of two-party c...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
International audienceCorrelated secret randomness is a useful resource for many cryptographic appli...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Correlated oblivious transfer (COT) is a crucial building block for secure multi-party computation (...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
International audienceIn this work we introduce a new (circuit-dependent) homomorphic secret sharing...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We study the problem of non-interactive multiparty computation (NI-MPC) where a group of completely ...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. A private-key cryptosystem may be viewed as a means by which a trusted dealer privately co...