Conclave: secure multi-party computation on big data

N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …

An efficient framework for unconditionally secure multiparty computation

A Choudhury, A Patra - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
parties to securely compute an agreed function f over some finite field in the presence of a
computationally unbounded adversary, who can maliciously corrupt any t out of the n …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

The more the merrier: reducing the cost of large scale MPC

SD Gordon, D Starin, A Yerukhimovich - … on the Theory and Applications of …, 2021 - Springer
Secure multi-party computation (MPC) allows multiple parties to perform secure joint
computations on their private inputs. Today, applications for MPC are growing with …

The price of low communication in secure multi-party computation

J Garay, Y Ishai, R Ostrovsky, V Zikas - Annual International Cryptology …, 2017 - Springer
Traditional protocols for secure multi-party computation among n parties communicate at
least a linear (in n) number of bits, even when computing very simple functions. In this work …

Stormy: Statistics in tor by measuring securely

R Wails, A Johnson, D Starin, A Yerukhimovich… - Proceedings of the …, 2019 - dl.acm.org
Tor is a tool for Internet privacy with millions of daily users. The Tor system benefits in many
ways from information gathered about the operation of its network. Measurements guide …

Brief announcement: Scalable agreement protocols with optimal optimistic efficiency

Y Gelles, I Komargodski - 37th International Symposium on …, 2023 - drops.dagstuhl.de
Designing efficient distributed protocols for various agreement tasks such as Byzantine
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …

Recent results in scalable multi-party computation

J Saia, M Zamani - International Conference on Current Trends in Theory …, 2015 - Springer
Secure multi-party computation (MPC) allows multiple parties to compute a known function
over inputs held by each party, without any party having to reveal its private input …

Optimally resilient asynchronous MPC with linear communication complexity

A Choudhury, A Patra - … of the 16th International Conference on …, 2015 - dl.acm.org
We present a secure asynchronous multiparty computation (AMPC) protocol with optimal
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …

The bottleneck complexity of secure multiparty computation

E Boyle, A Jain, M Prabhakaran… - … Colloquium on Automata …, 2018 - drops.dagstuhl.de
In this work, we initiate the study of bottleneck complexity as a new communication efficiency
measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an …