2014
DOI: 10.1007/978-3-662-44381-1_28
|View full text |Cite
|
Sign up to set email alerts
|

Dishonest Majority Multi-Party Computation for Binary Circuits

Abstract: Abstract. We extend the Tiny-OT two party protocol of Nielsen et al (CRYPTO 2012) to the case of n parties in the dishonest majority setting. This is done by presenting a novel way of transferring pairwise authentications into global authentications. As a by product we obtain a more efficient manner of producing globally authenticated shares, in the random oracle model, which in turn leads to a more efficient two party protocol than that of Nielsen et al.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 43 publications
(48 citation statements)
references
References 15 publications
0
48
0
Order By: Relevance
“…Our protocol for F 2 40 triples has the biggest advantage over previous protocols, with an estimated 200x speed-up over the SPDZ implementation. For binary circuits, our multi-party protocol is comparable with the two-party TinyOT protocol and around 3x faster than the fixed protocol of Larraia et al [16]. For MiniMAC, we give figures for the amortized cost of a single multiplication in F 2 8 .…”
Section: Our Contributionsmentioning
confidence: 97%
See 4 more Smart Citations
“…Our protocol for F 2 40 triples has the biggest advantage over previous protocols, with an estimated 200x speed-up over the SPDZ implementation. For binary circuits, our multi-party protocol is comparable with the two-party TinyOT protocol and around 3x faster than the fixed protocol of Larraia et al [16]. For MiniMAC, we give figures for the amortized cost of a single multiplication in F 2 8 .…”
Section: Our Contributionsmentioning
confidence: 97%
“…Our main contribution is a new method of creating SPDZ triples in F 2 k using only symmetric primitives, so it is much more efficient than previous protocols using SHE. Our protocol is based on a novel correlated OT extension protocol that increases efficiency by allowing an adversary to introduce errors of a specific form, which may be 2-party TinyOT [18,5] 0 54 0.07 F2 n-party TinyOT [16,5] 81n(n − 1) 27n(n − 1) 0.24 This work §5.2 27n(n − 1) 9n(n − 1) 0.08…”
Section: Our Contributionsmentioning
confidence: 99%
See 3 more Smart Citations