Secure multi-party computation without agreement

From MaRDI portal
Publication:2501711

DOI10.1007/s00145-005-0319-zzbMath1102.68472OpenAlexW2064829080MaRDI QIDQ2501711

Yehuda Lindell

Publication date: 12 September 2006

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-005-0319-z




Related Items (35)

Secure Computation, I/O-Efficient Algorithms and Distributed SignaturesTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeEfficient Secure Multiparty Computation with Identifiable AbortMore Efficient Constant-Round Multi-party Computation from BMR and SHESecure Computation with Minimal Interaction, RevisitedSynchronous consensus with optimal asynchronous fallback guaranteesOn fully secure MPC with solitary outputBroadcast (and Round) Efficient Verifiable Secret Sharing\textsc{SuperPack}: dishonest majority MPC with constant online communicationMixed-technique multi-party computations composed of two-party computationsHigh-throughput secure three-party computation with an honest majorityNon-interactive zero-knowledge proofs to multiple verifiersFairness versus guaranteed output delivery in secure multiparty computationCompleteness theorems for adaptively secure broadcastSecure computation with low communication from cross-checking\(1/p\)-secure multiparty computation without an honest majority and the best of both worldsResource fairness and composability of cryptographic protocolsFast large-scale honest-majority MPC for malicious adversariesEfficient, actively secure MPC with a dishonest majority: a surveySymmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computationsCharacterization of secure multiparty computation without broadcastHigh-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajoritySecurity against covert adversaries: Efficient protocols for realistic adversariesFrom fairness to full security in multiparty computationProtocols for multiparty coin toss with a dishonest majorityOn expected constant-round protocols for Byzantine agreementLegally-Enforceable Fairness in Secure Two-Party ComputationLow cost constant round MPC combining BMR and oblivious transferCryptography in the multi-string modelGeneral composition and universal composability in secure multiparty computationProbabilistic Termination and Composability of Cryptographic ProtocolsProbabilistic termination and composability of cryptographic protocolsMultiparty generation of an RSA modulusAn efficient passive-to-active compiler for honest-majority MPC over ringsBroadcast-optimal two-round MPC






This page was built for publication: Secure multi-party computation without agreement