We revisit the question of minimizing the randomness complexity of protocols for secure multiparty computation (MPC) in the setting of perfect information-theoretic security. Kushilevitz and Mansour (SIAM J. Discret. Math., 1997) studied the case of $n$-party semi-honest MPC for the XOR function with security threshold $t<n$, showing that $O(t^2\log(n/t))$ random bits are sufficient and $\Omega(t)$ random bits are necessary. Their positive result was obtained via a non-explicit protocol, whose existence was proved using the probabilistic method. We essentially close the question by proving an $\Omega(t^2)$ lower bound on the randomness complexity of XOR, matching the previous upper bound up to a logarithmic factor (or constant factor when ...
We study the communication complexity of unconditionally secure multiparty computation (MPC) protoco...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
We consider the amount of randomness used in private distributed computations. Specifically, we show...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We study the communication complexity of unconditionally secure multiparty computation (MPC) protoco...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
We consider the amount of randomness used in private distributed computations. Specifically, we show...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We study the communication complexity of unconditionally secure multiparty computation (MPC) protoco...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...