Abstract We describe an automatic analysis to check secure multiparty computation protocols against privacy leaks. The analysis is sound — a protocol that is deemed private does not leak anything about its private inputs, even if active attacks are performed against it. Privacy against active adversaries is an essential ingredient in constructions aiming to provide security (privacy + correctness) in adversarial models of inter-mediate (between passive and active) strength. Using our analysis we are able to show that the protocols used by the Sharemind secure multi-party computation platform are actively private.
Abstract—The existing work on distributed secure multi-party computation, e.g., set operations, dot ...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
Abstract. In secure multiparty computation, a set of mutually mistrusting players engage in a protoc...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
In this paper we address the issue related to privacy, security, complexity and Implementation, var...
The data, which contain the personal, medical and financial information of the data donors, are clas...
Secure computation enables many parties to jointly compute a function of their private inputs. The s...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
This thesis sets as goal the study and development of cryptographic multi-party protocols offering t...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Abstract—The existing work on distributed secure multi-party computation, e.g., set operations, dot ...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
Abstract. In secure multiparty computation, a set of mutually mistrusting players engage in a protoc...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
In this paper we address the issue related to privacy, security, complexity and Implementation, var...
The data, which contain the personal, medical and financial information of the data donors, are clas...
Secure computation enables many parties to jointly compute a function of their private inputs. The s...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
This thesis sets as goal the study and development of cryptographic multi-party protocols offering t...
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P...
Abstract—The existing work on distributed secure multi-party computation, e.g., set operations, dot ...
The Secure Multi-Party Computation (SMC) model provides means for balancing the use and confidential...
Abstract. In secure multiparty computation, a set of mutually mistrusting players engage in a protoc...