We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for n - 1 corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties' keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. We f...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
In this work we develop a new theory for concretely efficient, large-scale MPC with active security....
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Abstract. Recently, there has been huge progress in the field of con-cretely efficient secure comput...
International audienceSecure multiparty computation (MPC) has recently been increasingly adopted to ...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Secure multiparty computation$~$(MPC) enables privacy-preserving collaborative computation over sens...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
In this work we develop a new theory for concretely efficient, large-scale MPC with active security....
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Abstract. Recently, there has been huge progress in the field of con-cretely efficient secure comput...
International audienceSecure multiparty computation (MPC) has recently been increasingly adopted to ...
© 2019, International Association for Cryptologic Research. Recently, there has been huge progress i...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Secure multiparty computation$~$(MPC) enables privacy-preserving collaborative computation over sens...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...