We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* adversaries who may attempt to cheat, but do not wish to be caught doing so. Covert adversaries lie in between semi-honest adversaries who follow protocol specification and malicious adversaries who may deviate arbitrarily. Recently, two round protocols for semi-honest MPC and four round protocols for malicious-secure MPC were constructed, both of which are optimal. While these results can be viewed as constituting two end points of a security spectrum, we investigate the design of protocols that potentially span the spectrum. Our main result is an MPC protocol against covert adversaries with variable round complexity: when the detection prob...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
In STOC 1988, Ben-Or, Goldwasser, and Wigderson (BGW) established an important milestone in the fiel...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
In STOC 1988, Ben-Or, Goldwasser, and Wigderson (BGW) established an important milestone in the fiel...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...