2020
DOI: 10.1007/978-3-030-64378-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Round Optimal Secure Multiparty Computation from Minimal Assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 34 publications
0
17
0
Order By: Relevance
“…To state our main theorem, we argue that the four-round MPC protocol proposed in [10] is perfectly correct and that the final bounded-rewind MPC protocol we obtain from Theorem 1 preserves the perfect correctness of the input protocol. Given that the protocol of Choudhuri et al [10] is based on OT, which in turn can be based on TDPs, we can state the following.…”
Section: Our Resultsmentioning
confidence: 98%
See 4 more Smart Citations
“…To state our main theorem, we argue that the four-round MPC protocol proposed in [10] is perfectly correct and that the final bounded-rewind MPC protocol we obtain from Theorem 1 preserves the perfect correctness of the input protocol. Given that the protocol of Choudhuri et al [10] is based on OT, which in turn can be based on TDPs, we can state the following.…”
Section: Our Resultsmentioning
confidence: 98%
“…We realize this notion using a compiler that turns, in a round-preserving manner, any four-round MPC protocol into a bounded-rewind secure MPC protocol. Our compiler relies on a bounded-rewind secure oblivious transfer (OT) protocol (similar to the one proposed by Choudhuri et al [10]), on Yao's Garbled Circuits (GC) and public-key encryption. Unfortunately, we cannot directly use the OT protocol of Choudhuri et al [10], since we need the OT to be simulation-based secure against malicious receivers.…”
Section: Our Resultsmentioning
confidence: 99%
See 3 more Smart Citations