Secure multiparty computation enables protocol participants to compute the output of a public function of their private inputs whilst protecting the confidentiality of their inputs. But such an output, as a function of its inputs, inevitably leaks some information about input val- ues regardless of the protocol used to compute it. We introduce founda- tions for quantifying and understanding how such leakage may influence input behaviour of deceitful protocol participants as well as that of par- ticipants they target. Our model captures the beliefs and knowledge that participants have about what input values other participants may choose. In this model, measures of information flow that may arise between pro- tocol participants are introduce...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Journal version of GameSec'17 paper (arXiv:1705.05030)A common goal in the areas of secure informati...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Abstract—In game theory, a trusted mediator acting on behalf of the players can enable the attainmen...
Abstract. In secure multiparty computation, a set of mutually mistrusting players engage in a protoc...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Journal version of GameSec'17 paper (arXiv:1705.05030)A common goal in the areas of secure informati...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
Abstract—In game theory, a trusted mediator acting on behalf of the players can enable the attainmen...
Abstract. In secure multiparty computation, a set of mutually mistrusting players engage in a protoc...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...