Malicious security for SCALES. Outsourced computation with ephemeral servers
From MaRDI portal
Publication:6653038
DOI10.1007/978-3-031-68400-5_1MaRDI QIDQ6653038
Manoj Prabhakaran, Vladimir Kolesnikov, Anasuya Acharaya, Carmit Hazay
Publication date: 13 December 2024
Cites Work
- A proof of security of Yao's protocol for two-party computation
- Two-round multiparty secure computation from minimal assumptions
- Distinguisher-dependent simulation in two rounds and its applications
- Can a public blockchain keep a secret?
- Multiparty reusable non-interactive secure computation from LWE
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles
- Fluid MPC: secure multiparty computation with dynamic participants
- Blockchains enable non-interactive MPC
- Random-index PIR and applications
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Efficient Non-interactive Secure Computation
- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
- A Framework for Efficient and Composable Oblivious Transfer
- Reusable Two-Round MPC from LPN
- Two-Round Secure MPC from Indistinguishability Obfuscation
- Le Mans: dynamic and fluid MPC for dishonest majority
- SCALES. MPC with small clients and larger ephemeral servers
- Secure multiparty computation from threshold encryption based on class groups
- Malicious security for SCALES. Outsourced computation with ephemeral servers
Related Items (1)
This page was built for publication: Malicious security for SCALES. Outsourced computation with ephemeral servers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6653038)