Four round secure computation without setup

From MaRDI portal
Publication:1690211

DOI10.1007/978-3-319-70500-2_22zbMath1410.94052OpenAlexW2620838540MaRDI QIDQ1690211

Antigoni Polychroniadou, Zvika Brakerski, Shai Halevi

Publication date: 19 January 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70500-2_22




Related Items (27)

On the round complexity of secure quantum computationOn the round complexity of black-box secure MPCCounterexamples to new circular security assumptions underlying iOTwo-message statistically sender-private OT from LWERound-optimal multi-party computation with identifiable abortA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementFrom FE combiners to secure MPC and backMaliciously-secure MrNISC in the plain modelMulti-key Homomorphic Proxy Re-EncryptionStatistical security in two-party computation revisitedRound-optimal black-box secure computation from two-round malicious OTOn non-uniform security for black-box non-interactive CCA commitmentsRound-optimal black-box MPC in the plain modelReusable secure computation in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingOn the exact round complexity of best-of-both-worlds multi-party computationTwo-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock PuzzlesTwo-round maliciously secure computation with super-polynomial simulationBlockchains enable non-interactive MPCMaliciously circuit-private multi-key FHE and MPC based on LWEWhat security can we achieve within 4 rounds?On the exact round complexity of secure three-party computationRound-optimal secure multi-party computationPost-quantum multi-party computationMultiparty reusable non-interactive secure computation from LWETowards accountability in CRS generationTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS






This page was built for publication: Four round secure computation without setup