Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
Abstract
References
Index Terms
- Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
Recommendations
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Advances in Cryptology – CRYPTO 2020AbstractRecent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. While much progress has been made concerning its efficiency, many current, state-of-the-art protocols are vulnerable to Denial ...
Efficient Secure Multiparty Computation with Identifiable Abort
Proceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 9985We study secure multiparty computation MPC in the dishonest majority setting providing security with identifiable abort, where if the protocol aborts, the honest parties can agree upon the identity of a corrupt party. All known constructions that ...
Round-Optimal Multi-party Computation with Identifiable Abort
Advances in Cryptology – EUROCRYPT 2022AbstractSecure multi-party computation (MPC) protocols that are resilient to a dishonest majority allow the adversary to get the output of the computation while, at the same time, forcing the honest parties to abort. Aumann and Lindell introduced the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in