Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of $n$ mutually distrusting parties with private inputs to securely compute any publicly-known function of their inputs, by keeping their respective inputs as private as possible. While several works in the past have addressed the problem of designing communication-efficient MPC protocols in the synchronous communication setting, not much attention has been paid to the design of efficient MPC protocols in the asynchronous communication setting. In this work, we focus on the design of efficient asynchronous MPC (AMPC) protocol with statistical security, tolerating a computationally unbounded adversary, capable of corrup...
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to e...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying com...
We present a new technique for robust secret reconstruction with $O(n)$ communication complexity. B...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a s...
Over the past few years, massive cyberattacks have dominated the public imagination. Most Americans...
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to e...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this paper, we present an optimally-resilient, unconditionally-secure asynchronous multi-party co...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating $t < n/3$ cor...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corru...
Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying com...
We present a new technique for robust secret reconstruction with $O(n)$ communication complexity. B...
Multiparty computation (MPC) among n parties can tolerate up to t<n/2 active corruptions in a synchr...
Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a s...
Over the past few years, massive cyberattacks have dominated the public imagination. Most Americans...
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to e...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...