In the context of secure computation, protocols with security against covert adversaries ensure that any misbehavior by malicious parties will be detected by the honest parties with some constant probability. As such, these protocols provide better security guarantees than passively secure protocols and, moreover, are easier to construct than protocols with full security against active adversaries. Protocols that, upon detecting a cheating attempt, allow the honest parties to compute a certificate that enables third parties to verify whether an accused party misbehaved or not are called publicly verifiable. In this work, we present the first generic compilers for constructing two-party protocols with covert security and public verifiabilit...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We introduce the notion of covert security with public verifiability, building on the covert securit...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
This paper presents a generic “GMW-style” method for turning passively secure protocols into protoco...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency tra...
Protocols with \emph{publicly verifiable covert (PVC) security} offer high efficiency and an appeali...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
Von Ahn, Hopper and Langford introduced the notion of steganographic a.k.a. covert computation, to c...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We introduce the notion of covert security with public verifiability, building on the covert securit...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficien...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
This paper presents a generic “GMW-style” method for turning passively secure protocols into protoco...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency tra...
Protocols with \emph{publicly verifiable covert (PVC) security} offer high efficiency and an appeali...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
Von Ahn, Hopper and Langford introduced the notion of steganographic a.k.a. covert computation, to c...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...