In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalability, load-balancing issues, trusted party assumptions, and/or weak security guarantees. In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced. In particular, we require each party to send only a polylogarithmic number of bits and perform a polylogarithmic ...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party protocols are cryptographic protocols which multiple players engage in. Many appl...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We devise multi-party computation protocols for general secure function evaluation with the property...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
In this paper, we revisit the problem of secure shuffling in a three-server setting with an honest m...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In this work we consider the following question: What is the cost of security for multi-party protoc...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party protocols are cryptographic protocols which multiple players engage in. Many appl...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
We devise multi-party computation protocols for general secure function evaluation with the property...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) pro...
In this paper, we revisit the problem of secure shuffling in a three-server setting with an honest m...
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a ...
Fully secure multiparty computation (or guaranteed output delivery) among n parties can be achieved ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In this work we consider the following question: What is the cost of security for multi-party protoc...
We study the exact round complexity of secure multiparty computation (MPC) in the honest majority se...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party protocols are cryptographic protocols which multiple players engage in. Many appl...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...