Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits - MaRDI portal

\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits

From MaRDI portal
Publication:1648849

DOI10.1007/978-3-319-78375-8_17zbMath1428.94060OpenAlexW2794717746MaRDI QIDQ1648849

Fabrice Benhamouda, Huijia Lin

Publication date: 9 July 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_17




Related Items

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOThree-round secure multiparty computation from black-box two-round oblivious transferOn the round complexity of black-box secure MPCTwo-round MPC: information-theoretic and black-boxPerfect secure computation in two roundsTwo-round adaptively secure multiparty computation from standard assumptionsSuccinct garbling schemes from functional encryption through a local simulation paradigmRound-optimal and communication-efficient multiparty computationReusable Two-Round MPC from LPNA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementOptimal bounded-collusion secure functional encryptionFrom FE combiners to secure MPC and backMinimizing setup in broadcast-optimal two round MPCEfficient laconic cryptography from learning with errorsRound-optimal oblivious transfer and MPC from computational CSIDHSCALES. MPC with small clients and larger ephemeral serversmrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulusConcurrently composable non-interactive secure computationKnowledge encryption and its applications to simulatable protocols with low round-complexityOn non-uniform security for black-box non-interactive CCA commitmentsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsTwo-round adaptively secure MPC from isogenies, LPN, or CDHQuadratic multiparty randomized encodings beyond honest majority and their applicationsReusable secure computation in the plain modelSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesSecure computation with shared EPR pairs (or: how to teleport in zero-knowledge)On the exact round complexity of best-of-both-worlds multi-party computationTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Efficient and round-optimal oblivious transfer and commitment with adaptive securityTwo-round maliciously secure computation with super-polynomial simulationOn actively-secure elementary MPC reductionsOn communication models and best-achievable security in two-round MPCOblivious transfer from trapdoor permutations in minimal roundsLaconic private set intersection and applicationsOffline witness encryption with semi-adaptive securityPerfect Secure Computation in Two RoundsWhat security can we achieve within 4 rounds?Beyond honest majority: the round complexity of fair and robust multi-party computationInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?On the exact round complexity of secure three-party computationRound-optimal secure multi-party computationMinicrypt primitives with algebraic structure and applicationsPost-quantum multi-party computationMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsTowards accountability in CRS generationBETA: biometric-enabled threshold authenticationReverse firewalls for actively secure MPCsEfficient and tight oblivious transfer from PKE with tight multi-user securityTwo-round oblivious transfer from CDH or LPNBroadcast-optimal two-round MPC