Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Round optimal secure multiparty computation from minimal assumptions - MaRDI portal

Round optimal secure multiparty computation from minimal assumptions

From MaRDI portal
Publication:2119049

DOI10.1007/978-3-030-64378-2_11OpenAlexW3116603271MaRDI QIDQ2119049

Rafail Ostrovsky, Vipul Goyal, Michele Ciampi, Arka Rai Choudhuri, Abhishek Jain

Publication date: 23 March 2022

Full work available at URL: https://eprint.iacr.org/2019/216




Related Items (23)

On the round complexity of secure quantum computationOn the round complexity of black-box secure MPCRound-optimal and communication-efficient multiparty computationRound-optimal multi-party computation with identifiable abortA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementMaliciously-secure MrNISC in the plain modelRound-optimal oblivious transfer and MPC from computational CSIDHStatistical security in two-party computation revisitedFour-round black-box non-malleable schemes from one-way permutationsRound-optimal black-box secure computation from two-round malicious OTDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFKnowledge encryption and its applications to simulatable protocols with low round-complexityOn non-uniform security for black-box non-interactive CCA commitmentsA new approach to efficient non-malleable zero-knowledgeRound-optimal black-box MPC in the plain modelReusable secure computation in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingTwo-round maliciously secure computation with super-polynomial simulationBlockchains enable non-interactive MPCOblivious transfer from trapdoor permutations in minimal roundsOn the exact round complexity of secure three-party computationMinicrypt primitives with algebraic structure and applicationsTowards accountability in CRS generation




This page was built for publication: Round optimal secure multiparty computation from minimal assumptions