We present a computationally secure MPC protocol for threshold adversaries which is parametrized by a value L. When L=2 we obtain a classical form of MPC protocol in which interaction is required for multiplications, as L increases interaction is reduced in that one requires interaction only after computing a higher degree function. When L approaches infinity one obtains the FHE based protocol of Gentry, which requires no interaction. Thus one can trade communication for computation in a simple way. Our protocol is based on an interactive protocol for ``bootstrapping\u27\u27 a somewhat homomorphic encryption scheme. The key contribution is that our presented protocol is highly communication efficient enabling us to obtain reduced communica...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
© 2018, Springer Nature Switzerland AG. We show that the recent, highly efficient, three-party hones...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
In a public-key threshold encryption scheme, the sender produces a single ciphertext, and any +1 out...
A fundamental and widely-applied paradigm due to Franklin and Yung (STOC 1992) on Shamir-secret-shar...
A fundamental and widely-applied paradigm due to Franklin and Yung (STOC 1992) on Shamir-secret-shar...
Motivated by what we call honest but lazy‚ parties in the context of secure multi party computatio...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
We construct a general multiparty computation (MPC) protocol with only two rounds of interaction in ...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
© 2018, Springer Nature Switzerland AG. We show that the recent, highly efficient, three-party hones...
We introduce a new approach to multiparty computation (MPC) basingit on homomorphic threshold crypto...
We introduce a new approach to multiparty computation (MPC) bas-ing it on homomorphic threshold cryp...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the ...
In a public-key threshold encryption scheme, the sender produces a single ciphertext, and any +1 out...
A fundamental and widely-applied paradigm due to Franklin and Yung (STOC 1992) on Shamir-secret-shar...
A fundamental and widely-applied paradigm due to Franklin and Yung (STOC 1992) on Shamir-secret-shar...
Motivated by what we call honest but lazy‚ parties in the context of secure multi party computatio...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
We construct a general multiparty computation (MPC) protocol with only two rounds of interaction in ...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
We present a new technique for robust secret reconstruction with O(n) communication complexity. By a...
© 2018, Springer Nature Switzerland AG. We show that the recent, highly efficient, three-party hones...