Fluid MPC: secure multiparty computation with dynamic participants
From MaRDI portal
Publication:2128557
DOI10.1007/978-3-030-84245-1_4OpenAlexW3038091381MaRDI QIDQ2128557
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84245-1_4
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer system organization (68Mxx)
Related Items (10)
Public randomness extraction with ephemeral roles and worst-case corruptions ⋮ Le Mans: dynamic and fluid MPC for dishonest majority ⋮ SCALES. MPC with small clients and larger ephemeral servers ⋮ Improved single-round secure multiplication using regenerating codes ⋮ On linear communication complexity for (maximally) fluid MPC ⋮ Cryptography with weights: MPC, encryption and signatures ⋮ Perfect MPC over layered graphs ⋮ Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation ⋮ Blockchains enable non-interactive MPC ⋮ Random-index PIR and applications
Uses Software
Cites Work
- Unnamed Item
- Fast large-scale honest-majority MPC for malicious adversaries
- Minimising communication in honest-majority MPC by batchwise multiplication verification
- Proactive secure multiparty computation with a dishonest majority
- Guaranteed output delivery comes free in honest majority MPC
- Algorand: a secure and efficient distributed ledger
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Multiparty Computation from Somewhat Homomorphic Encryption
- How to withstand mobile virus attacks, revisited
- The Bitcoin Backbone Protocol: Analysis and Applications
- Binary AMD Circuits from Secure Multiparty Computation
- Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits
- Scalable and Unconditionally Secure Multiparty Computation
- How to withstand mobile virus attacks (extended abstract)
- Circuits resilient to additive attacks with applications to secure computation
- Analysis of the Blockchain Protocol in Asynchronous Networks
- FruitChains
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Theory of Cryptography
- Scalable Secure Multiparty Computation
- Theory of Cryptography
This page was built for publication: Fluid MPC: secure multiparty computation with dynamic participants