2015
DOI: 10.1007/978-3-662-46078-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Recent Results in Scalable Multi-Party Computation

Abstract: Abstract. Secure multi-party computation (MPC) allows multiple parties to compute a known function over inputs held by each party, without any party having to reveal its private input. Unfortunately, traditional MPC algorithms do not scale well to large numbers of parties. In this paper, we describe several recent MPC algorithms that are designed to handle large networks. All of these algorithms rely on recent techniques from the Byzantine agreement literature on forming and using quorums. Informally, a quorum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(32 citation statements)
references
References 55 publications
0
32
0
Order By: Relevance
“…Algorithms exist for completely generic secure computations, Saia and Zamani give a comprehensive overview with a focus on scalability [9]. However, due to their focus on generic computations, these approaches are relatively complex and in the context of our application they still do not scale well enough and do not tolerate dynamic membership either.…”
Section: Related Workmentioning
confidence: 99%
“…Algorithms exist for completely generic secure computations, Saia and Zamani give a comprehensive overview with a focus on scalability [9]. However, due to their focus on generic computations, these approaches are relatively complex and in the context of our application they still do not scale well enough and do not tolerate dynamic membership either.…”
Section: Related Workmentioning
confidence: 99%
“…The actively malicious case mandates the availability of Byzantine consensus as a building block [51]. 6 In practical applications, the inputs typically consist of sets of values that were given to the peers P by external clients.…”
Section: Application To Smcmentioning
confidence: 99%
“…BGW exploits the fact that Shamir secret sharing admits basic operation such as addition and multiplication (at the cost of some communication among nodes). There have been some efforts to improve the efficiency of MPC algorithms, but mainly focusing on the communication loads (see [9]). This is an extended version of the paper, partially presented in IEEE Communication Theory Workshop (CTW), May 2018, and IEEE International Symposium on Information Theory (ISIT), June 2018 [1].…”
Section: Introductionmentioning
confidence: 99%