Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
Crypten: Secure multi-party computation meets machine learning
Secure multi-party computation (MPC) allows parties to perform computations on data while
keeping that data private. This capability has great potential for machine-learning …
keeping that data private. This capability has great potential for machine-learning …
MP-SPDZ: A versatile framework for multi-party computation
M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
High-throughput semi-honest secure three-party computation with an honest majority
In this paper, we describe a new information-theoretic protocol (and a computationally-
secure variant) for secure three-party computation with an honest majority. The protocol has …
secure variant) for secure three-party computation with an honest majority. The protocol has …
Efficient pseudorandom correlation generators: Silent OT extension and more
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
Efficient circuit-based PSI with linear communication
We present a new protocol for computing a circuit which implements the private set
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
FROST: flexible round-optimized Schnorr threshold signatures
C Komlo, I Goldberg - Selected Areas in Cryptography: 27th International …, 2021 - Springer
Unlike signatures in a single-party setting, threshold signatures require cooperation among
a threshold number of signers each holding a share of a common private key. Consequently …
a threshold number of signers each holding a share of a common private key. Consequently …
Provably secure higher-order masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …
(SCA). To counteract it, masking schemes are usually involved which randomize key …
Fast large-scale honest-majority MPC for malicious adversaries
K Chida, K Hamada, D Ikarashi, R Kikuchi… - Journal of …, 2023 - Springer
Protocols for secure multiparty computation enable a set of parties to compute a function of
their inputs without revealing anything but the output. The security properties of the protocol …
their inputs without revealing anything but the output. The security properties of the protocol …
New primitives for actively-secure MPC over rings with applications to private machine learning
At CRYPTO 2018 Cramer et al. presented SPDZ2k, a new secret-sharing based protocol for
actively secure multi-party computation against a dishonest majority, that works over rings …
actively secure multi-party computation against a dishonest majority, that works over rings …