Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. While much progress has been made concerning its efficiency, many current, state-of-the-art protocols are vulnerable to Denial of Service attacks, where a cheating party may prevent the honest parties from learning the output of the computation, whilst remaining anonymous. The security model of identifiable abort aims to prevent these attacks, by allowing honest parties to agree upon the identity of a cheating party, who can then be excluded in the future. Several existing MPC protocols offer security with identifiable abort against a dishonest majority of corrupted parties. However, all of these protocols have a round com...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
In this work we focus on improving the communication complexity of the \emph{online phase} of honest...
Cheater identification in secure multi-party computation (MPC) allows the honest parties to agree up...
Secure multi-party computation (MPC) protocols that are resilient to a dishonest majority allow the ...
We present fundamental (in-)feasibility results for the strongest security notion for Secure Multi-P...
In the setting of secure multiparty computation, a set of mutually distrustful parties carry out a j...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort again...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
In recent years, Multiparty computation as a service (MPCSaaS) is gaining popularity as a...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
In this work we focus on improving the communication complexity of the \emph{online phase} of honest...
Cheater identification in secure multi-party computation (MPC) allows the honest parties to agree up...
Secure multi-party computation (MPC) protocols that are resilient to a dishonest majority allow the ...
We present fundamental (in-)feasibility results for the strongest security notion for Secure Multi-P...
In the setting of secure multiparty computation, a set of mutually distrustful parties carry out a j...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort again...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
In recent years, Multiparty computation as a service (MPCSaaS) is gaining popularity as a...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
In this work we focus on improving the communication complexity of the \emph{online phase} of honest...