We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for $n-1$ corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties\u27 keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. ...
Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to comput...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
In the setting of secure multiparty computation, a set of mutually distrustful parties carry out a j...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) an...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
We study information-theoretic secure multiparty protocols that achieve full security, including gua...
In this work we develop a new theory for concretely efficient, large-scale MPC with active security....
Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to comput...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
We present a new approach to designing concretely efficient MPC protocols with semi-honest security ...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
In the setting of secure multiparty computation, a set of mutually distrustful parties carry out a j...
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation have found a lo...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research...
Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) an...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
We study information-theoretic secure multiparty protocols that achieve full security, including gua...
In this work we develop a new theory for concretely efficient, large-scale MPC with active security....
Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to comput...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...