2018
DOI: 10.1007/978-3-319-96881-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Round-Optimal Secure Multiparty Computation with Honest Majority

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…Garg et al [91] show it is possible to build tworound MPC protocols that require a fixed number of OT calls, complemented by a polynomial number of cheaper oneway function calls, thus limiting the number of expensive public key operations. Ananth et al [92] build a two-round MPC protocol in the honest majority setting that can provide security with abort (an adversary may not prevent honest parties from learning the output of a computation by aborting the protocol). They also build a two-round MPC protocol that provides guaranteed output delivery.…”
Section: Efficiency Gainsmentioning
confidence: 99%
“…Garg et al [91] show it is possible to build tworound MPC protocols that require a fixed number of OT calls, complemented by a polynomial number of cheaper oneway function calls, thus limiting the number of expensive public key operations. Ananth et al [92] build a two-round MPC protocol in the honest majority setting that can provide security with abort (an adversary may not prevent honest parties from learning the output of a computation by aborting the protocol). They also build a two-round MPC protocol that provides guaranteed output delivery.…”
Section: Efficiency Gainsmentioning
confidence: 99%
“…We remark that the proof in [ 2 ] also follows this intuition; however, that proof uses specific properties of the (simulator for the) broadcast-model protocol constructed in [ 2 ] (which in turn is based on the protocol from [ 1 ]). Our goal is to provide a generic compiler, which works for any two-round broadcast-model protocol, and so our use of the simulator for the broadcast-model protocol must be black-box.…”
Section: Introductionmentioning
confidence: 98%
“…Two-round MPC protocols in the malicious setting were first explored in [ 37 , 38 ], while recent years have witnessed exciting developments in two-round MPC [ 1 5 , 9 11 , 15 , 25 , 26 , 31 36 , 42 , 49 , 51 , 59 , 60 , 64 ]. The current state of the art can be summarized as follows: Garg and Srinivasan [ 33 ] and Benhamouda and Lin [ 9 ] showed how to balance between the optimal round complexity and minimal cryptographic assumptions for MPC in the broadcast model, by showing that every function can be computed with unanimous abort using two broadcast rounds, assuming two-round oblivious transfer (OT) and tolerating corruptions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, if merely unanimous abort is required, even this setup assumption can be removed [29]. 1 However, as discussed above, in terms of round efficiency, removing the broadcast resource is not for free and one needs to either pay with more rounds to emulate broadcast [27,30], or lessen the obtained security guarantees. However, very few generic ways to trade-off broadcast for weaker security have been proposed.…”
Section: Introductionmentioning
confidence: 99%