A secure multiparty computation (MPC) allows several parties to compute a function over their inputs while keeping their inputs private. In its basic setting, the protocol involves only parties that hold inputs. In distributed MPC, there are also external servers who perform a distributed protocol that executes the needed computation, without learning information on the inputs and outputs. Here we propose distributed protocols for several fundamental MPC functionalities. We begin with a Distributed Scalar Product (DSP) protocol for computing scalar products of private vectors. We build upon DSP in designing various protocols for Oblivious Transfer (OT): k-out-of-N OT, Priced OT, and Generalized OT. We also use DSP for Oblivious Polynomial E...
Dissertação de Mestrado em Engenharia InformáticaSecure Multiparty Computation (abrv. MPC) is a grou...
The number of opportunities for cooperative computation has exponentially been increasing with growi...
Many services that people use daily require computation that depends on the private data of multiple...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Dissertação de Mestrado em Engenharia InformáticaSecure Multiparty Computation (abrv. MPC) is a grou...
The number of opportunities for cooperative computation has exponentially been increasing with growi...
Many services that people use daily require computation that depends on the private data of multiple...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We consider the question of minimizing the round complexity of protocols for secure multiparty compu...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Dissertação de Mestrado em Engenharia InformáticaSecure Multiparty Computation (abrv. MPC) is a grou...
The number of opportunities for cooperative computation has exponentially been increasing with growi...
Many services that people use daily require computation that depends on the private data of multiple...