Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
An efficient framework for unconditionally secure multiparty computation
A Choudhury, A Patra - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
parties to securely compute an agreed function f over some finite field in the presence of a
computationally unbounded adversary, who can maliciously corrupt any t out of the n …
computationally unbounded adversary, who can maliciously corrupt any t out of the n …
Proof of work without all the work
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
The more the merrier: reducing the cost of large scale MPC
Secure multi-party computation (MPC) allows multiple parties to perform secure joint
computations on their private inputs. Today, applications for MPC are growing with …
computations on their private inputs. Today, applications for MPC are growing with …
The price of low communication in secure multi-party computation
Traditional protocols for secure multi-party computation among n parties communicate at
least a linear (in n) number of bits, even when computing very simple functions. In this work …
least a linear (in n) number of bits, even when computing very simple functions. In this work …
Stormy: Statistics in tor by measuring securely
Tor is a tool for Internet privacy with millions of daily users. The Tor system benefits in many
ways from information gathered about the operation of its network. Measurements guide …
ways from information gathered about the operation of its network. Measurements guide …
Brief announcement: Scalable agreement protocols with optimal optimistic efficiency
Y Gelles, I Komargodski - 37th International Symposium on …, 2023 - drops.dagstuhl.de
Designing efficient distributed protocols for various agreement tasks such as Byzantine
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …
Recent results in scalable multi-party computation
Secure multi-party computation (MPC) allows multiple parties to compute a known function
over inputs held by each party, without any party having to reveal its private input …
over inputs held by each party, without any party having to reveal its private input …
Optimally resilient asynchronous MPC with linear communication complexity
A Choudhury, A Patra - … of the 16th International Conference on …, 2015 - dl.acm.org
We present a secure asynchronous multiparty computation (AMPC) protocol with optimal
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …
resilience, involving n= 3t+ 1 parties and tolerating a computationally bounded static …
The bottleneck complexity of secure multiparty computation
In this work, we initiate the study of bottleneck complexity as a new communication efficiency
measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an …
measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an …