Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits - MaRDI portal

Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

From MaRDI portal
Publication:2925559

DOI10.1007/978-3-642-40203-6_1zbMath1406.94041OpenAlexW1635361314MaRDI QIDQ2925559

Marcel Keller, Valerio Pastro, Peter Scholl, Enrique Larraia, Nigel P. Smart, Ivan B. Damgård

Publication date: 16 October 2014

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://link.springer.com/chapter/10.1007/978-3-642-40203-6_1




Related Items (66)

Compilation of function representations for secure computing paradigmsOblivious TLS via multi-party computationMulti-party revocation in sovrin: performance through distributed trustMhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPSublinear GMW-style compiler for MPC with preprocessingAn efficient structural attack on NIST submission DAGSEfficient Secure Multiparty Computation with Identifiable AbortMore Efficient Constant-Round Multi-party Computation from BMR and SHEImproving the efficiency of AES protocols in multi-party computationActively Secure OT Extension with Optimal Overhead\( \mathsf{Rabbit} \): efficient comparison for secure multi-party computationImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsThe cost of IEEE arithmetic in secure computationHonest majority MPC with abort with minimal online communicationLabeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced dataImproved signature schemes for secure multi-party computation with certified inputsRound-optimal multi-party computation with identifiable abortSecure multiparty computation with sublinear preprocessingLimits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPNEfficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois ringsMArBLed circuits: mixing arithmetic and Boolean circuits with active securityAbsentia: secure multiparty computation on ethereumKicking-the-bucket: fast privacy-preserving trading using buckets\textsc{SuperPack}: dishonest majority MPC with constant online communicationCheater Detection in SPDZ Multiparty ComputationPutting the online phase on a diet: covert security from short MACsFrom Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsLe Mans: dynamic and fluid MPC for dishonest majorityVerifiable decryption in the headMPClan: protocol suite for privacy-conscious computationsMultikey Fully Homomorphic Encryption and ApplicationsMore efficient dishonest majority secure computation over \(\mathbb{Z}_{2^k}\) via Galois ringsFinancially backed covert securityMaliciously secure matrix multiplication with applications to private deep learningCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationOn multiparty garbling of arithmetic circuitsConcretely efficient large-scale MPC with active security (or tinykeys for tinyot)Fast large-scale honest-majority MPC for malicious adversariesEfficient, actively secure MPC with a dishonest majority: a surveyOblivious polynomial evaluation and secure set-intersection from algebraic PRFsOn the Computational Overhead of MPC with Dishonest MajorityAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackBlock cipher invariants as eigenvectors of correlation matricesYet another compiler for active security or: efficient MPC over arbitrary ringsHigh-performance multi-party computation for binary circuits based on oblivious transferLow cost constant round MPC combining BMR and oblivious transferMon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)The more the merrier: reducing the cost of large scale MPCGeneric compiler for publicly verifiable covert multi-party computationBetter Preprocessing for Secure Multiparty ComputationVerifiable Multi-party Computation with Perfectly Private Audit TrailMasked triples. Amortizing multiplication triples across conditionalsLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingProbabilistic Termination and Composability of Cryptographic ProtocolsHow to Prove Knowledge of Small SecretsProbabilistic termination and composability of cryptographic protocolsEfficient constant-round multi-party computation combining BMR and SPDZActively secure setup for SPDZEfficient pseudorandom correlation generators from ring-LPNBlack-box transformations from passive to covert security with public verifiabilityImproved primitives for MPC over mixed arithmetic-binary circuitsEfficient two-party exponentiation from quotient transferEfficient compiler to covert security with public verifiability for honest majority MPCAn efficient passive-to-active compiler for honest-majority MPC over ringsThe price of active security in cryptographic protocols




This page was built for publication: Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits