Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete communication network such that the network topology remains hidden even from a powerful adversary who can corrupt parties. This communication network can then be used to perform arbitrary tasks, for example secure multi-party computation, in a topology-hiding manner. Previously proposed protocols could only tolerate passive corruption. This paper proposes protocols that can also tolerate fail-corruption (i.e., the adversary can crash any party at any point in time) and so-called semi-malicious corruption (i.e., the adversary can control a cor...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcas...
The idea of protocol security is fundamental in cryptography, and the cryptographic literature is fu...
Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcas...
Abstract A distributed computation in which nodes are connected by a partial communication graph is...
Thesis: S.M., Massachusetts Institute of Technology, Department of Department of Electrical Engineer...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
AbstractIn cryptography we investigate security aspects of data distributed in a network. This kind ...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
Copyright © 2015 ACM. The vast majority of works on secure multi-party computation (MPC) assume a fu...
We consider secure multi-party computation (MPC) in a setting where the adversary can separately cor...
AbstractA covert communications network is a connected, overlay, peer-to-peer network being used to ...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcas...
The idea of protocol security is fundamental in cryptography, and the cryptographic literature is fu...
Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcas...
Abstract A distributed computation in which nodes are connected by a partial communication graph is...
Thesis: S.M., Massachusetts Institute of Technology, Department of Department of Electrical Engineer...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
AbstractIn cryptography we investigate security aspects of data distributed in a network. This kind ...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
Copyright © 2015 ACM. The vast majority of works on secure multi-party computation (MPC) assume a fu...
We consider secure multi-party computation (MPC) in a setting where the adversary can separately cor...
AbstractA covert communications network is a connected, overlay, peer-to-peer network being used to ...
Traditional protocols for secure multi-party computation among n parties communicate at least a line...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...