Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

Threshold ECDSA in three rounds

J Doerner, Y Kondi, E Lee… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …

Compact, efficient and UC-secure isogeny-based oblivious transfer

YF Lai, SD Galbraith… - … Conference on the …, 2021 - Springer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …

PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

More efficient MPC from improved triple generation and authenticated garbling

K Yang, X Wang, J Zhang - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Recent works on distributed garbling have provided highly efficient solutions for constant-
round MPC tolerating an arbitrary number of corruptions. In this work, we improve upon state …

Round-optimal oblivious transfer and MPC from computational CSIDH

S Badrinarayanan, D Masny, P Mukherjee… - … Conference on Public …, 2023 - Springer
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …

Batching base oblivious transfers

I McQuoid, M Rosulek, L Roy - … 2021: 27th International Conference on the …, 2021 - Springer
Protocols that make use of oblivious transfer (OT) rarely require just one instance. Usually, a
batch of OTs is required—notably, when generating base OTs for OT extension. There is a …

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

S Chakraborty, C Ganesh, P Sarkar - … on the Theory and Applications of …, 2023 - Springer
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …

Efficient and round-optimal oblivious transfer and commitment with adaptive security

R Canetti, P Sarkar, X Wang - International Conference on the Theory and …, 2020 - Springer
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …

A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR

S Dong, H Cui, K Zhang, K Yang, Y Yu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Oblivious transfer (OT) is a fundamental cryptographic protocol that plays a crucial role in
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …