Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of a malicious adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this standard-bearer\u27\u27 cryptographic primitive is unknown. Recently, Garg, Mukherjee, Pandey and Polychroniadou, in EUROCRYPT 2016 demonstrated that the round complexity of any MPC protocol relying on black-box proofs of security in the plain model must be at least four. Following this work, independently Ananth, Choudhuri and Jain, CRYPTO 2017 and Brakerski, Halevi, and Polychroniadou, TCC 2017 ...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
In STOC 1988, Ben-Or, Goldwasser, and Wigderson (BGW) established an important milestone in the fiel...
A central direction of research in secure multiparty computation with dishonest majority has been to...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
We construct a 4-round multi-party computation protocol in the plain model for any functionality, se...
In this paper, we study the round complexity of concurrently secure multi-party computation (MPC) wi...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* ad...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
In STOC 1988, Ben-Or, Goldwasser, and Wigderson (BGW) established an important milestone in the fiel...
A central direction of research in secure multiparty computation with dishonest majority has been to...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
We construct a 4-round multi-party computation protocol in the plain model for any functionality, se...
In this paper, we study the round complexity of concurrently secure multi-party computation (MPC) wi...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...