Traditional protocols for secure multi-party computation among n parties communicate at least a linear (in n) number of bits, even when computing very simple functions. In this work we investigate the feasibility of protocols with sublinear communication complexity. Concretely, we consider two clients, one of which may be corrupted, who wish to perform some “small” joint computation using n servers but without any trusted setup. We show that enforcing sublinear communication complexity drastically affects the feasibility bounds on the number of corrupted parties that can be tolerated in the setting of information-theoretic security. We provide a complete investigation of security in the presence of semi-honest adversaries---static and adap...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
In this work we consider the following question: What is the cost of security for multi-party protoc...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even f...
Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even f...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Secure computation enables mutually distrusting parties to jointly compute a function on their secre...
The best known $n$ party unconditional multiparty computation protocols with an optimal corruption t...
We devise multi-party computation protocols for general secure function evaluation with the property...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...
In this work we consider the following question: What is the cost of security for multi-party protoc...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even f...
Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even f...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Secure computation enables mutually distrusting parties to jointly compute a function on their secre...
The best known $n$ party unconditional multiparty computation protocols with an optimal corruption t...
We devise multi-party computation protocols for general secure function evaluation with the property...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Protocols for secure multiparty computation enable a set of parties to compute a function of their i...