Scalable Multiparty Computation with Nearly Optimal Work and Resilience

From MaRDI portal
Publication:3600223

DOI10.1007/978-3-540-85174-5_14zbMath1183.68082OpenAlexW1939687213MaRDI QIDQ3600223

No author found.

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_14




Related Items (29)

Two attacks on rank metric code-based schemes: RankSign and an IBE schemeLarge-Scale Secure Computation: Multi-party Computation for (Parallel) RAM ProgramsSecure multi-party computation in large networksOn the Bottleneck Complexity of MPC with Correlated RandomnessA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Multikey Fully Homomorphic Encryption and ApplicationsUnnamed ItemHow to recover a secret with \(O(n)\) additionsCryptography with weights: MPC, encryption and signaturesTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computationSecure computation with low communication from cross-checkingDecentralized polling with respectable participantsCommunication-efficient proactive secret sharing for dynamic groups with dishonest majoritiesEfficient robust secret sharing from expander graphsOn the Computational Overhead of MPC with Dishonest MajorityCommunication-Optimal Proactive Secret Sharing for Dynamic GroupsFrom fairness to full security in multiparty computationPolynomial Evaluation and Side Channel AnalysisEfficient and Decentralized Polling Protocol for General Social NetworksOrder-C secure multiparty computation for highly repetitive circuitsMulti-party threshold private set intersection with sublinear communicationProactive Secret Sharing with a Dishonest MajorityNetwork Oblivious TransferOn the Communication Required for Unconditionally Secure MultiplicationBounded Indistinguishability and the Complexity of Recovering SecretsFrom Passive to Covert Security at Low Cost




This page was built for publication: Scalable Multiparty Computation with Nearly Optimal Work and Resilience