Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Can a public blockchain keep a secret?
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …
increasingly as an architecture for distributed computing. In this work we seek solutions that …
Concretely efficient secure multi-party computation protocols: survey and more
D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …
their private inputs, and reveals nothing but the output of the function. In the last decade …
Yoso: You only speak once: Secure mpc with stateless ephemeral roles
The inherent difficulty of maintaining stateful environments over long periods of time gave
rise to the paradigm of serverless computing, where mostly stateless components are …
rise to the paradigm of serverless computing, where mostly stateless components are …
Scalable byzantine reliable broadcast (extended version)
Byzantine reliable broadcast is a powerful primitive that allows a set of processes to agree
on a message from a designated sender, even if some processes (including the sender) are …
on a message from a designated sender, even if some processes (including the sender) are …
Turbopack: honest majority MPC with constant online communication
We present a novel approach to honest majority secure multiparty computation in the
preprocessing model with information theoretic security that achieves the best online …
preprocessing model with information theoretic security that achieves the best online …
Non-interactive zero-knowledge proofs to multiple verifiers
K Yang, X Wang - International Conference on the Theory and …, 2022 - Springer
In this paper, we study zero-knowledge (ZK) proofs for circuit satisfiability that can prove to n
verifiers at a time efficiently. The proofs are secure against the collusion of a prover and a …
verifiers at a time efficiently. The proofs are secure against the collusion of a prover and a …
Unconditional communication-efficient MPC via Hall's marriage theorem
The best known n party unconditional multiparty computation protocols with an optimal
corruption threshold communicates O (n) field elements per gate. This has been the case …
corruption threshold communicates O (n) field elements per gate. This has been the case …
The more the merrier: reducing the cost of large scale MPC
Secure multi-party computation (MPC) allows multiple parties to perform secure joint
computations on their private inputs. Today, applications for MPC are growing with …
computations on their private inputs. Today, applications for MPC are growing with …
Adaptively secure MPC with sublinear communication complexity
A central challenge in the study of MPC is to balance between security guarantees,
hardness assumptions, and resources required for the protocol. In this work, we study the …
hardness assumptions, and resources required for the protocol. In this work, we study the …