We present a unified view of the two-party and multi-party computation protocols based on oblivious transfer first outlined in Nielsen et al. (CRYPTO 2012) and Larraia et al. (CRYPTO 2014). We present a number of modifications and improvements to these earlier presentations, as well as full proofs of the entire protocol. Improvements include a unified pre-processing and online MAC methodology, mechanisms to pass between different MAC variants and fixing a minor bug in the protocol of Larraia et al. in relation to a selective failure attack. It also fixes a minor bug in Nielsen et al. resulting from using Jensen’s inequality in the wrong direction in an analysis
Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting whe...
We present the design and implementation of a compiler that automatically generates protocols that p...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
Abstract We present a unified view of the two-party and multi-party computation protocols based on o...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Abstract. In secure two-party computation, two mutually distrusting parties are interested in jointl...
Abstract. In secure two-party computation protocols, the cut-and-choose paradigm is used to prevent ...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We consider the problem of constant-round secure two-party computation in the presence of active (ma...
Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting whe...
We present the design and implementation of a compiler that automatically generates protocols that p...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
Abstract We present a unified view of the two-party and multi-party computation protocols based on o...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Abstract. In secure two-party computation, two mutually distrusting parties are interested in jointl...
Abstract. In secure two-party computation protocols, the cut-and-choose paradigm is used to prevent ...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We consider the problem of constant-round secure two-party computation in the presence of active (ma...
Abstract. We study the problem of secure two-party and multiparty computation (MPC) in a setting whe...
We present the design and implementation of a compiler that automatically generates protocols that p...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...