2016
DOI: 10.1007/s00446-016-0284-9
|View full text |Cite
|
Sign up to set email alerts
|

Secure multi-party computation in large networks

Abstract: We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a 1/3 fraction of the parties. In the asynchronous setting, we allow the adversary to corrupt less than a 1/8 fraction of parties. For any deterministic function that can be computed by an arithmetic circu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 54 publications
0
5
0
Order By: Relevance
“…This shows that MPC can be designed in cloud settings to reduce computation load. Secure multi‐party computation schemes 7,11,12,19 are designed for semi‐trusted cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…This shows that MPC can be designed in cloud settings to reduce computation load. Secure multi‐party computation schemes 7,11,12,19 are designed for semi‐trusted cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…Classical results tell us that the fully connected graph suffices for secure computation. Protocols achieving low locality indicate that a variety of significantly sparser graphs, with many low-weight cuts, can also be used [37,17,27,18]. We thus consider a natural extension of connectivity to the setting of low degree.…”
Section: What Properties Of Induced Communication Graphs Are Necessar...mentioning
confidence: 99%
“…When allowing for negligible error (in the number of parties), the above lower bounds do not apply, opening the door for dramatically different approaches and improvements in complexity. Indeed, distributed protocols have been shown for Byzantine agreement in this model with as low as Õ(n) bits of communication [66,21], and secure MPC protocols have been constructed whose communication graphs have degree o(n)-and as low as polylog(n) [37,17,27,18]. 2 However, unlike the deep history of the model above, the current status is a sprinkling of positive results.…”
Section: Introductionmentioning
confidence: 99%
“…The idea of electing a small committee to perform a computation was initially used in [14], and has been considered in numerous settings, such as: leakage-resilient secure computation [9,10], large-scale MPC [11,12,30,13], leader election [51,47], Byzantine agreement [49,50,52,15], and distributed key-generation [19].…”
Section: Additional Related Workmentioning
confidence: 99%