2010
DOI: 10.1007/978-3-642-13190-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography

Abstract: Abstract. We study the following two related questions:-What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority? -What are the minimal resources required for two-party primitives such as zero-knowledge proofs and general secure two-party computation? We obtain a nearly tight answer to the first question by presenting a perfectly secure protocol which allows n players to evaluate an arithmetic circuit of size s by performing a total o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 144 publications
(89 citation statements)
references
References 30 publications
0
89
0
Order By: Relevance
“…A special case of this transformation is implicit in [25]. We reduce the general case to honestmajority MPC in the semi-honest model and instantiate it using a recent efficient protocol from [10].…”
Section: Overview Of Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…A special case of this transformation is implicit in [25]. We reduce the general case to honestmajority MPC in the semi-honest model and instantiate it using a recent efficient protocol from [10].…”
Section: Overview Of Techniquesmentioning
confidence: 99%
“…Our general approach employs perfectly secure MPC protocols for the malicious model. The efficiency improvement will be obtained by plugging in the recent perfectly secure protocol from [10].…”
Section: Overview Of New Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…We combine Lemma 36 with results from [21,33] and with robust r-wise PRGs to compile any circuit C into a 2 −Ω(κ) disjunction resilient circuit C with poly(κ) randomness complexity, where the size of C is within a polylog factor of the size of C whenever C is much larger than its depth, input, and output size.…”
Section: Secure Two-party Computationmentioning
confidence: 99%
“…We construct C Disj from C and κ via the following steps. First, similarly to [33], we use the efficient MPC protocol from [21] to efficiently generate, given C and κ, a κ-private implementation (I, C , O) of size s = s · polylog(κ) + poly(κ, d, n i , n o ) and randomness locality poly(κ). (The randomness locality feature can be obtained via a "refreshing" approach similarly to the one used in Claim 31.)…”
Section: Secure Two-party Computationmentioning
confidence: 99%