A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
[HTML][HTML] Secure multiparty computation
Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
Outsourcing multi-party computation
We initiate the study of secure multi-party computation (MPC) in a server-aided setting,
where the parties have access to a single server that (1) does not have any input to the …
where the parties have access to a single server that (1) does not have any input to the …
MP-SPDZ: A versatile framework for multi-party computation
M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård… - … Conference on Financial …, 2009 - Springer
Secure Multiparty Computation Goes Live Page 1 Secure Multiparty Computation Goes Live *
Peter Bogetoft3, Dan Lund Christensen4, Ivan Damgård2, Martin Geisler2, Thomas Jakobsen4 …
Peter Bogetoft3, Dan Lund Christensen4, Ivan Damgård2, Martin Geisler2, Thomas Jakobsen4 …
Scapi: The secure computation application programming interface
Y Ejgenberg, M Farbstein, M Levy… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Secure two-party and multiparty computation has long stood at the center of the foundations
of theoretical cryptography. Recently, however, interest has grown regarding the efficiency of …
of theoretical cryptography. Recently, however, interest has grown regarding the efficiency of …
Fluid MPC: secure multiparty computation with dynamic participants
Existing approaches to secure multiparty computation (MPC) require all participants to
commit to the entire duration of the protocol. As interest in MPC continues to grow, it is …
commit to the entire duration of the protocol. As interest in MPC continues to grow, it is …
High-throughput secure three-party computation for malicious adversaries and an honest majority
In this paper, we describe a new protocol for secure three-party computation of any
functionality, with an honest majority and a malicious adversary. Our protocol has both an …
functionality, with an honest majority and a malicious adversary. Our protocol has both an …
[HTML][HTML] Secure multi-party computation made simple
U Maurer - Discrete Applied Mathematics, 2006 - Elsevier
Known secure multi-party computation protocols are quite complex, involving non-trivial
mathematical structures and sub-protocols. The purpose of this paper is to present a very …
mathematical structures and sub-protocols. The purpose of this paper is to present a very …