Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Two-round multiparty secure computation from minimal assumptions

S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …

Efficient laconic cryptography from learning with errors

N Döttling, D Kolonelos, RWF Lai, C Lin… - … Conference on the …, 2023 - Springer
Laconic cryptography is an emerging paradigm that enables cryptographic primitives with
sublinear communication complexity in just two messages. In particular, a two-message …

Two-round oblivious transfer from CDH or LPN

N Döttling, S Garg, M Hajiabadi, D Masny… - … Conference on the …, 2020 - Springer
We show a new general approach for constructing maliciously-secure two-round oblivious
transfer (OT). Specifically, we provide a generic sequence of transformations to upgrade a …

Round-optimal secure multi-party computation

S Halevi, C Hazay, A Polychroniadou… - Journal of …, 2021 - Springer
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of
mutually distrustful parties to jointly compute some function of their private inputs where …

Round optimal secure multiparty computation from minimal assumptions

A Rai Choudhuri, M Ciampi, V Goyal, A Jain… - Theory of Cryptography …, 2020 - Springer
We construct a four round secure multip arty computation (MPC) protocol in the plain model
that achieves security against any dishonest majority. The security of our protocol relies only …

Promise zero knowledge and its applications to round optimal MPC

S Badrinarayanan, V Goyal, A Jain, YT Kalai… - Annual International …, 2018 - Springer
We devise a new partitioned simulation technique for MPC where the simulator uses
different strategies for simulating the view of aborting adversaries and non-aborting …

Round-optimal secure multiparty computation with honest majority

P Ananth, AR Choudhuri, A Goel, A Jain - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
We study the exact round complexity of secure multiparty computation (MPC) in the honest
majority setting. We construct several round-optimal n-party protocols, tolerating any t< n 2 …

Optimal bounded-collusion secure functional encryption

P Ananth, V Vaikuntanathan - Theory of Cryptography Conference, 2019 - Springer
We construct private-key and public-key functional encryption schemes in the bounded-key
setting; that is, secure against adversaries that obtain an a-priori bounded number of …

Multiparty reusable non-interactive secure computation from LWE

F Benhamouda, A Jain, I Komargodski… - … Conference on the Theory …, 2021 - Springer
Motivated by the goal of designing versatile and flexible secure computation protocols that at
the same time require as little interaction as possible, we present new multiparty reusable …