Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
From MaRDI portal
Publication:2912800
DOI10.1007/978-3-642-32928-9_14zbMath1365.68239OpenAlexW1884982511MaRDI QIDQ2912800
Marcel Keller, Enrique Larraia, Christian Miles, Ivan B. Damgård, Nigel P. Smart
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32928-9_14
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Related Items (5)
Efficient Secure Multiparty Computation with Identifiable Abort ⋮ Improving the efficiency of AES protocols in multi-party computation ⋮ One round threshold ECDSA without roll call ⋮ Faster Secure Multi-party Computation of AES and DES Using Lookup Tables ⋮ Efficient constant-round multi-party computation combining BMR and SPDZ
Uses Software
This page was built for publication: Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol