Reusable two-round MPC from DDH
From MaRDI portal
Publication:2119050
DOI10.1007/978-3-030-64378-2_12zbMath1497.68073OpenAlexW3116973868MaRDI QIDQ2119050
James Bartusek, Pratyay Mukherjee, Daniel Masny, Sanjam Garg
Publication date: 23 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-64378-2_12
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Related Items (7)
Black-box reusable NISC with random oracles ⋮ Maliciously-secure MrNISC in the plain model ⋮ mrNISC from LWE with polynomial modulus ⋮ Two-round MPC without round collapsing revisited -- towards efficient malicious protocols ⋮ Reusable secure computation in the plain model ⋮ Two-round maliciously secure computation with super-polynomial simulation ⋮ Multiparty reusable non-interactive secure computation from LWE
This page was built for publication: Reusable two-round MPC from DDH