Non-Interactive Secure Multiparty Computation
From MaRDI portal
Publication:2874549
DOI10.1007/978-3-662-44381-1_22zbMath1335.94030OpenAlexW117166206MaRDI QIDQ2874549
Yuval Ishai, Eyal Kushilevitz, Amos Beimel, Ariel Gabizon, Sigurd Meldgaard, Anat Paskin-Cherniavsky
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_22
secure multiparty computationobfuscationmulti-input functional encryptiongarbling schemesprivate simultaneous messages protocolsrandomized encoding of functions
Related Items (24)
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions ⋮ Best possible information-theoretic MPC ⋮ Survey of information security ⋮ Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials ⋮ On the (in)efficiency of non-interactive secure multiparty computation ⋮ Distributed (correlation) samplers: how to remove a trusted dealer in one round ⋮ On the Bottleneck Complexity of MPC with Correlated Randomness ⋮ On fully secure MPC with solitary output ⋮ Is information-theoretic topology-hiding computation possible? ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Private simultaneous messages based on quadratic residues ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ How to obfuscate MPC inputs ⋮ Towards practical topology-hiding computation ⋮ Additive randomized encodings and their applications ⋮ Blockchains enable non-interactive MPC ⋮ Brief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPC ⋮ Topology-hiding computation on all graphs ⋮ Multi-input Functional Encryption and Its Application in Outsourcing Computation ⋮ Multiparty reusable non-interactive secure computation from LWE ⋮ Threshold garbled circuits and ad hoc secure computation ⋮ On cryptographic anonymity and unpredictability in secret sharing ⋮ Ad Hoc PSM Protocols: Secure Computation Without Coordination ⋮ Topology-Hiding Computation Beyond Logarithmic Diameter
This page was built for publication: Non-Interactive Secure Multiparty Computation