Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4035736

zbMath0789.68061MaRDI QIDQ4035736

Donald Beaver

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (91)

Compilation of function representations for secure computing paradigmsMulti-party revocation in sovrin: performance through distributed trustConcretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyATLAS: efficient and scalable MPC in the honest majority settingMhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPSublinear GMW-style compiler for MPC with preprocessingSecure computation using leaky correlations (asymptotically optimal constructions)Two attacks on rank metric code-based schemes: RankSign and an IBE scheme\textsf{Mac'n'Cheese}: zero-knowledge proofs for Boolean and arithmetic circuits with nested disjunctionsMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsEfficient Secure Multiparty Computation with Identifiable AbortImproving the efficiency of AES protocols in multi-party computationImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsHonest majority MPC with abort with minimal online communicationConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Improving the efficiency of optimally-resilient statistically-secure asynchronous multi-party computationHigh throughput secure MPC over small population in hybrid networks (extended abstract)Constant-round client-aided secure comparison protocolSecure multi-party computation in large networksHighly efficient OT-based multiplication protocolsSecure multiparty computation with sublinear preprocessingSecure non-interactive simulation: feasibility and rateLow-Communication Multiparty Triple Generation for SPDZ from Ring-LPNSecure computation with preprocessing via function secret sharingMore efficient oblivious transfer extensionsMArBLed circuits: mixing arithmetic and Boolean circuits with active securityA theoretical and empirical evaluation of an algorithm for self-healing computationHow to simulate it in Isabelle: towards formal proof for secure multi-party computation\textsc{SuperPack}: dishonest majority MPC with constant online communicationDetect, pack and batch: perfectly-secure MPC with linear communication and constant expected timeFrom Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsThe return of the SDitHSyndrome decoding in the head: shorter signatures from zero-knowledge proofsRevisiting the efficiency of asynchronous MPC with optimal resilience against general adversariesHigh-throughput secure three-party computation with an honest majoritySharing transformation and dishonest majority MPC with packed secret sharingVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Authenticated garbling from simple correlationsSecure non-interactive simulation from arbitrary joint distributionsAmortizing division and exponentiationRandom sources in private computationAttaining GOD beyond honest majority with friends and foesCorrelated pseudorandomness from expand-accumulate codesRevisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversariesPrivate evaluation of a decision tree based on secret sharingManticore: a framework for efficient multiparty computation supporting real number and Boolean arithmeticNetwork-agnostic security comes (almost) for free in DKG and MPCOn linear communication complexity for (maximally) fluid MPCCryptography with weights: MPC, encryption and signaturesOne-message secure reductions: on the cost of converting correlationsSecure multiparty computation from threshold encryption based on class groupsTri-state circuits. A circuit model that captures RAMCorrelated pseudorandomness from the hardness of quasi-abelian decodingOn the exact round complexity of best-of-both-worlds multi-party computationCircuit amortization friendly encodingsand their application to statistically secure multiparty computationCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationSecure message transmission in asynchronous networksAsynchronous Multi-Party Computation with Quadratic CommunicationOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceOn communication-efficient asynchronous MPC with adaptive securitySecure computation with low communication from cross-checkingClient-Aided Two-Party Secure Interval Test ProtocolImproved Multiplication Triple Generation over Rings via RLWE-Based AHEMulti-party computation with conversion of secret sharingEfficient, actively secure MPC with a dishonest majority: a surveySecure Outsourced ComputationTinyKeys: a new approach to efficient multi-party computationHigh-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceEfficient asynchronous verifiable secret sharing and multiparty computationYet another compiler for active security or: efficient MPC over arbitrary ringsOn the local leakage resilience of linear secret sharing schemesOn the exact round complexity of secure three-party computationMulti-theorem preprocessing NIZKs from latticesEfficient perfectly secure computation with optimal resilienceLow cost constant round MPC combining BMR and oblivious transferEfficient perfectly secure computation with optimal resilienceGoing beyond dual execution: MPC for functions with efficient verificationThe more the merrier: reducing the cost of large scale MPCGeneric compiler for publicly verifiable covert multi-party computationFunction secret sharing for mixed-mode and fixed-point secure computationBetter Preprocessing for Secure Multiparty ComputationMasked triples. Amortizing multiplication triples across conditionalsLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingActively secure setup for SPDZRound Efficient Unconditionally Secure Multiparty Computation ProtocolEfficient pseudorandom correlation generators from ring-LPNEfficient two-party exponentiation from quotient transferEfficient compiler to covert security with public verifiability for honest majority MPCThe price of active security in cryptographic protocols




This page was built for publication: