Concretely efficient secure multi-party computation protocols: survey and more
D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …
their private inputs, and reveals nothing but the output of the function. In the last decade …
Threshold ECDSA in three rounds
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …
against a dishonest majority, which information-theoretically UC-realizes a standard …
Compact, efficient and UC-secure isogeny-based oblivious transfer
YF Lai, SD Galbraith… - … Conference on the …, 2021 - Springer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …
for almost all secure multiparty functionalities. The strongest security notion against …
PLASMA: Private, lightweight aggregated statistics against malicious adversaries
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …
strings, and data-collection servers aim to identify the most popular strings without learning …
More efficient MPC from improved triple generation and authenticated garbling
K Yang, X Wang, J Zhang - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Recent works on distributed garbling have provided highly efficient solutions for constant-
round MPC tolerating an arbitrary number of corruptions. In this work, we improve upon state …
round MPC tolerating an arbitrary number of corruptions. In this work, we improve upon state …
Round-optimal oblivious transfer and MPC from computational CSIDH
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …
Batching base oblivious transfers
Protocols that make use of oblivious transfer (OT) rarely require just one instance. Usually, a
batch of OTs is required—notably, when generating base OTs for OT extension. There is a …
batch of OTs is required—notably, when generating base OTs for OT extension. There is a …
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
Efficient and round-optimal oblivious transfer and commitment with adaptive security
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR
Oblivious transfer (OT) is a fundamental cryptographic protocol that plays a crucial role in
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …