A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
Authenticated garbling and efficient maliciously secure two-party computation
We propose a simple and efficient framework for obtaining efficient constant-round protocols
for maliciously secure two-party computation. Our framework uses a function-independent …
for maliciously secure two-party computation. Our framework uses a function-independent …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Obliv-C: A language for extensible data-oblivious computation
Many techniques for secure or private execution depend on executing programs in a data-
oblivious way, where the same instructions execute independent of the private inputs which …
oblivious way, where the same instructions execute independent of the private inputs which …
Concretely efficient secure multi-party computation protocols: survey and more
D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …
their private inputs, and reveals nothing but the output of the function. In the last decade …
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
Many organizations stand to benefit from pooling their data together in order to draw
mutually beneficial insights—eg, for fraud detection across banks, better medical studies …
mutually beneficial insights—eg, for fraud detection across banks, better medical studies …
Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently
M Jawurek, F Kerschbaum, C Orlandi - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and
have countless applications. However, after more than 30 years from their introduction, there …
have countless applications. However, after more than 30 years from their introduction, there …
Scalable multi-party private set-intersection
C Hazay, M Venkitasubramaniam - IACR international workshop on public …, 2017 - Springer
In this work we study the problem of private set-intersection in the multi-party setting and
design two protocols with the following improvements compared to prior work. First, our …
design two protocols with the following improvements compared to prior work. First, our …