We introduce the notion of {\em resource-fair} protocols. Informally, this property states that if one party learns the output of the protocol, then so can all other parties, as long as they expend roughly the same amount of resources. As opposed to similar previously proposed definitions, our definition follows the standard simulation paradigm and enjoys strong composability properties. In particular, our definition is similar to the security definition in the universal composability (UC) framework, but works in a model that allows any party to request additional resources from the environment to deal with dishonest parties that may prematurely abort. In this model we specify the ideally fair functionality as allowing parties to ``inves...
We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and p...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
A fair distributed protocol ensures that dishonest parties have no advantage over honest parties in ...
A fair distributed protocol ensures that dishonest parties have no advantage over honest parties in ...
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing...
Abstract. In TCC 2006, Garay et al. introduced the notion of "commit-prove-fair-open" func...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Protocols for secure two-party computation enable a pair of mutually distrustful parties to carry ou...
Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, cele...
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its posi...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
International audienceWe describe a new protocol to achieve two party ε-fair exchange: at any point ...
Secure two-party computation cannot be fair in general against malicious adversaries, unless a trust...
Secure multiparty computation allows mutually distrusting parties to compute a function on their pri...
We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and p...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
A fair distributed protocol ensures that dishonest parties have no advantage over honest parties in ...
A fair distributed protocol ensures that dishonest parties have no advantage over honest parties in ...
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing...
Abstract. In TCC 2006, Garay et al. introduced the notion of "commit-prove-fair-open" func...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
Protocols for secure two-party computation enable a pair of mutually distrustful parties to carry ou...
Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, cele...
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its posi...
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
International audienceWe describe a new protocol to achieve two party ε-fair exchange: at any point ...
Secure two-party computation cannot be fair in general against malicious adversaries, unless a trust...
Secure multiparty computation allows mutually distrusting parties to compute a function on their pri...
We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and p...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
A fair distributed protocol ensures that dishonest parties have no advantage over honest parties in ...