Attaining GOD beyond honest majority with friends and foes
From MaRDI portal
Publication:6135412
DOI10.1007/978-3-031-22963-3_19zbMath1519.94131MaRDI QIDQ6135412
Varsha Bhat Kukkala, Nishat Koti, Protik Paul, Aditya Hegde, Shravani Patil, Arpita Patra
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast large-scale honest-majority MPC for malicious adversaries
- Overdrive2k: efficient secure MPC over \(\mathbb{Z}_{2^k}\) from somewhat homomorphic encryption
- Overdrive: making SPDZ great again
- Minimising communication in honest-majority MPC by batchwise multiplication verification
- Secure computation with low communication from cross-checking
- \(\mathrm{SPD}\mathbb {Z}_{2^k}\): efficient MPC \(\mod 2^k\) for dishonest majority
- Yet another compiler for active security or: efficient MPC over arbitrary rings
- Guaranteed output delivery comes free in honest majority MPC
- MPC with friends and foes
- An efficient passive-to-active compiler for honest-majority MPC over rings
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings
- Turbospeedz: double your online SPDZ! Improving SPDZ using function dependent preprocessing
- Zero-knowledge proofs on secret-shared data via fully linear PCPs
- Efficient pseudorandom correlation generators: silent OT extension and more
- Secure MPC: laziness leads to GOD
- Efficient fully secure computation via distributed zero-knowledge proofs
- Better Preprocessing for Secure Multiparty Computation
- Multiparty Computation from Somewhat Homomorphic Encryption
- Authenticated Algorithms for Byzantine Agreement
- Efficient Secure Multiparty Computation with Identifiable Abort
- Secure Computation with Minimal Interaction, Revisited
- Actively Secure OT Extension with Optimal Overhead
- Founding Cryptography on Oblivious Transfer – Efficiently
- Scalable and Unconditionally Secure Multiparty Computation
- Multi-Party Computation with Omnipresent Adversary
- Perfectly secure message transmission
- Advances in Cryptology - CRYPTO 2003
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
- High-throughput secure three-party computation with an honest majority
This page was built for publication: Attaining GOD beyond honest majority with friends and foes