2018
DOI: 10.1007/978-3-030-03810-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Best Possible Information-Theoretic MPC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Elemental as it seems, this minimal secure computation problem preserves most challenging features of general secure computation; in particular, feasibility results remain strong and optimality results remain weak, i.e., any function f can be computed securely while the construction of efficient codes remains open in general [12,13]. In this work, we focus exclusively on the original three-party formulation of minimal secure computation [12], but note that many interesting variants have been studied (sometimes under different names to highlight different assumptions) in the literature, e.g., more than three parties [14][15][16], colluding parties [17][18][19][20], other security notions [21], and unresponsive parties [22].…”
Section: Introductionmentioning
confidence: 99%
“…Elemental as it seems, this minimal secure computation problem preserves most challenging features of general secure computation; in particular, feasibility results remain strong and optimality results remain weak, i.e., any function f can be computed securely while the construction of efficient codes remains open in general [12,13]. In this work, we focus exclusively on the original three-party formulation of minimal secure computation [12], but note that many interesting variants have been studied (sometimes under different names to highlight different assumptions) in the literature, e.g., more than three parties [14][15][16], colluding parties [17][18][19][20], other security notions [21], and unresponsive parties [22].…”
Section: Introductionmentioning
confidence: 99%
“…Elemental as it seems, this minimal secure computation problem preserves most challenging features of general secure computation; in particular, feasibility results remain strong and optimality results remain weak, i.e., any function f can be computed securely while efficient codes are mostly not available [11,12]. In this work we focus exclusively on the original three-party formulation of minimal secure computation [11], but note that many interesting variants have been studied (sometimes under different names to highlight different assumptions) in the literature, e.g., more than three parties [13][14][15], colluding parties [16][17][18][19], other security notions [20], and unresponsive parties [21].…”
Section: Introductionmentioning
confidence: 99%