Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133979
|View full text |Cite
|
Sign up to set email alerts
|

Global-Scale Secure Multiparty Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
90
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 133 publications
(91 citation statements)
references
References 20 publications
1
90
0
Order By: Relevance
“…Finally, we introduce our triple generation protocol, in two phases. Similarly to [WRK17b], we first show how to compute the cross terms in multiplication triples by computing so-called 'half-authenticated' triples. This protocol does not authenticate all terms and the result may yield an incorrect triple.…”
Section: Technical Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, we introduce our triple generation protocol, in two phases. Similarly to [WRK17b], we first show how to compute the cross terms in multiplication triples by computing so-called 'half-authenticated' triples. This protocol does not authenticate all terms and the result may yield an incorrect triple.…”
Section: Technical Overviewmentioning
confidence: 99%
“…We discuss this in more detail in Section 8. Our protocol starts to concretely improve upon previous protocols when we reach n = 30 parties and t = 18 corruptions: here, our triple generation method requires less than half the communication cost of the fastest MPC protocol which is also based on TinyOT [WRK17b] (dubbed WRK) tolerating up to n − 1 corruptions. For a fairer comparison, we also consider modifying WRK to run in a committee of size t + 1, to give a protocol with the same corruption threshold as ours.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Given the wide variety of statistics that researchers would like to compute, in order to address this problem, better tools for compiling general statistical algorithms into MPC protocols need to be developed. In recent years, however, significant progress has been made in MPC compilers (Aly et al n.d.;Zhang et al 2013;Wang et al 2017). Although these compilers can be used to run arbitrary computations, the cryptographic requirements of the MPC protocols mean that the most efficient (insecure) algorithms for calculating a statistic of interest, may not be the most efficient algorithms to run within a secure computation (Esperança et al 2017).…”
Section: Statisticsmentioning
confidence: 99%