2016
DOI: 10.1007/978-3-662-53008-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Secure Protocol Transformations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 29 publications
2
10
0
Order By: Relevance
“…We remark that this improves over the result of Chida et al [ 9 ] that achieves O ( s ) overhead for binary fields, and generalizes the result of Ishai et al [ 31 ] that achieves the same result, but only for a constant number of parties. We remark that the latter protocol additionally achieve constant-rate, while our protocol only achieves constant-overhead.…”
Section: Corollaries and Applicationssupporting
confidence: 78%
See 1 more Smart Citation
“…We remark that this improves over the result of Chida et al [ 9 ] that achieves O ( s ) overhead for binary fields, and generalizes the result of Ishai et al [ 31 ] that achieves the same result, but only for a constant number of parties. We remark that the latter protocol additionally achieve constant-rate, while our protocol only achieves constant-overhead.…”
Section: Corollaries and Applicationssupporting
confidence: 78%
“…In the honest majority regime for , our compiler gives an actively-secure protocol for boolean circuits with constant overhead over a variant of passive-BGW [ 5 ] that is instantiated using AG secret sharing schemes. This result improves over the recent protocol by Chida et al [ 9 ], which only achieves constant overhead for large fields (introducing an extra statistical security parameter s for small fields with an overhead of ), and over Ishai et al [ 31 ] who achieve constant-overhead for arbitrary fields, but only for few parties. We note that [ 11 ] achieves constant-rate secure protocols, but only for suboptimal corruption thresholds.…”
Section: Introductionsupporting
confidence: 59%
“…3 and 4] from partially identifiable abort 12 to full security in the honest-majority setting. In [46], the computation of SS n→(t ,n ) in-out (f n ) with partially identifiable abort is carried out iteratively by a committee, initially consisting of all the parties, until the output is obtained. In case of abort, all the identified parties (both honest and corrupted) are removed from the committee.…”
Section: Corollary 15 (Informal)mentioning
confidence: 99%
“…In case of abort, all the identified parties (both honest and corrupted) are removed from the committee. It follows that the number of iterations in [46] is O(n). Corollary 1.7 (informal).…”
Section: Corollary 15 (Informal)mentioning
confidence: 99%
See 1 more Smart Citation