Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Can a public blockchain keep a secret?

F Benhamouda, C Gentry, S Gorbunov, S Halevi… - Theory of Cryptography …, 2020 - Springer
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

Yoso: You only speak once: Secure mpc with stateless ephemeral roles

C Gentry, S Halevi, H Krawczyk, B Magri… - Annual International …, 2021 - Springer
The inherent difficulty of maintaining stateful environments over long periods of time gave
rise to the paradigm of serverless computing, where mostly stateless components are …

Scalable byzantine reliable broadcast (extended version)

R Guerraoui, P Kuznetsov, M Monti, M Pavlovic… - arxiv preprint arxiv …, 2019 - arxiv.org
Byzantine reliable broadcast is a powerful primitive that allows a set of processes to agree
on a message from a designated sender, even if some processes (including the sender) are …

Turbopack: honest majority MPC with constant online communication

D Escudero, V Goyal, A Polychroniadou… - Proceedings of the 2022 …, 2022 - dl.acm.org
We present a novel approach to honest majority secure multiparty computation in the
preprocessing model with information theoretic security that achieves the best online …

Non-interactive zero-knowledge proofs to multiple verifiers

K Yang, X Wang - International Conference on the Theory and …, 2022 - Springer
In this paper, we study zero-knowledge (ZK) proofs for circuit satisfiability that can prove to n
verifiers at a time efficiently. The proofs are secure against the collusion of a prover and a …

Unconditional communication-efficient MPC via Hall's marriage theorem

V Goyal, A Polychroniadou, Y Song - … 2021, Virtual Event, August 16–20 …, 2021 - Springer
The best known n party unconditional multiparty computation protocols with an optimal
corruption threshold communicates O (n) field elements per gate. This has been the case …

The more the merrier: reducing the cost of large scale MPC

SD Gordon, D Starin, A Yerukhimovich - … on the Theory and Applications of …, 2021 - Springer
Secure multi-party computation (MPC) allows multiple parties to perform secure joint
computations on their private inputs. Today, applications for MPC are growing with …

Adaptively secure MPC with sublinear communication complexity

R Cohen, A Shelat, D Wichs - … in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
A central challenge in the study of MPC is to balance between security guarantees,
hardness assumptions, and resources required for the protocol. In this work, we study the …