Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Multi-Party Computation with Identifiable Abort - MaRDI portal

Secure Multi-Party Computation with Identifiable Abort

From MaRDI portal
Publication:2874547

DOI10.1007/978-3-662-44381-1_21zbMath1335.94053OpenAlexW312279799MaRDI QIDQ2874547

Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_21




Related Items (35)

Round efficient secure multiparty quantum computation with identifiable abortAlmost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters MaliciousEfficient Secure Multiparty Computation with Identifiable AbortShielded computations in smart contracts overcoming forksSurvey of information securityA complete characterization of game-theoretically fair, multi-party coin tossGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsRound-optimal multi-party computation with identifiable abortCRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}imeCheater Detection in SPDZ Multiparty ComputationPutting the online phase on a diet: covert security from short MACsZero-knowledge arguments for subverted RSA groupsAlmost-optimally fair multiparty coin-tossing with nearly three-quarters maliciousOn sufficient oracles for secure computation with identifiable abort(Public) verifiability for composable protocols without adaptivity or zero-knowledgeNetwork-agnostic security comes (almost) for free in DKG and MPCOn active attack detection in messaging with immediate decryptionOn actively-secure elementary MPC reductionsOn communication models and best-achievable security in two-round MPC\(1/p\)-secure multiparty computation without an honest majority and the best of both worldsMust the communication graph of MPC protocols be an expander?Efficient, actively secure MPC with a dishonest majority: a surveyFrom fairness to full security in multiparty computationRound-preserving parallel composition of probabilistic-termination cryptographic protocolsMultiparty generation of an RSA modulusGeneric compiler for publicly verifiable covert multi-party computationTARDIS: a foundation of time-lock puzzles in UCSecure Protocol TransformationsProbabilistic termination and composability of cryptographic protocolsEfficient constant-round MPC with identifiable abort and public verifiabilityAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackFAST: fair auctions via secret transactionsBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityMultiparty generation of an RSA modulusBroadcast-optimal two-round MPC




This page was built for publication: Secure Multi-Party Computation with Identifiable Abort