2017
DOI: 10.1007/978-3-319-63715-0_1
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation Based on Leaky Correlations: High Resilience Setting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 62 publications
0
4
0
Order By: Relevance
“…The former work is in the context of information-theoretically secure protocols, while the latter studied 2-party protocols over small fields where the assumed resource is OLE over an extension field. This is partially based on a previous work also by Block et al,[4] where (asymptotically less efficient) constructions of RMFEs were implicitly used.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The former work is in the context of information-theoretically secure protocols, while the latter studied 2-party protocols over small fields where the assumed resource is OLE over an extension field. This is partially based on a previous work also by Block et al,[4] where (asymptotically less efficient) constructions of RMFEs were implicitly used.…”
Section: Related Workmentioning
confidence: 99%
“…Our ideas can be extended to arithmetic circuits over other small fields 4. Here we assume that broadcasting messages of M bits requires to send M bits to every other player, which one can achieve with small overhead that vanishes for large messages[13, full version] …”
mentioning
confidence: 99%
“…While this notion has not been explicitely defined 3 in the literature to the best of our knowledge, a construction for RMFEs was introduced in another work on secure multiparty computation, more precisely on the problem of correlation extraction [BMN17], where it is used to embed a number of instances of oblivious linear evaluation over a small field into one instance of OLE over the extension field. They obtain, for every prime power q and every integer ≥ 1, a (2 , 3 ) q .…”
Section: Main Ideasmentioning
confidence: 99%
“…Reverse Multiplication Friendly Embeddings (RMFEs), as introduced in [CCXY18, CRX19] (and recap in Section 2.4) , can also be seen as a SIMD encoding. On a technical level, the combinatorial problem behind our SIMD construction has been previously applied in the context of packing for homomorphic encryption [OSV20] and leakage-resilient MPC [BMN17].…”
Section: Simd Encodingsmentioning
confidence: 99%