Skip to main content

Questions tagged [multiparty-computation]

Multi-party computation (MPC) allows a set of parties, each with a private input, to securely and jointly perform any computation over their inputs.

3 votes
1 answer
145 views

I am learning about simulation based proofs, specifically the tutorial by Lindell and the simplified UC paper by Canetti et al, and I am trying to understand the precise requirements needed for ...
Tim's user avatar
  • 33
3 votes
1 answer
70 views

I am implementing correlated oblivious transfer extension (COTe) based on Fig. 10 of updated KOS15 paper (by skipping last two steps which de-correlates sender's and receiver's output) which states it'...
leoha's user avatar
  • 31
1 vote
0 answers
45 views

Let's consider linear secret sharing based MPC over a prime field $p$. While $\kappa=40$ is often cited as a common default value for the statistical security parameter of MPC protocols, my ...
Raoul722's user avatar
  • 3,017
2 votes
0 answers
51 views

I read the ABY3 paper. First of all, I noticed that the labels for "malicious" and "semi-honest" are swapped Table 2. Additionally, I don’t understand why ABY3 achieves 4k ...
user105684's user avatar
5 votes
1 answer
167 views

The intuition behind simulation-based security proofs comes from the following idea — if any party participating in a protocol or system can fully simulate the entire interaction process without ...
DSTBP's user avatar
  • 331
0 votes
0 answers
64 views

Could you please clarify whether a Beaver Triple is essentially a form of Functional Secret Sharing (FSS)? I feel that a Beaver Triple might be the key for the share of the multiplication function. If ...
DSTBP's user avatar
  • 331
1 vote
1 answer
96 views

Is there any existing work on a 2D variant of a packed Shamir secret shares (see paper here), i.e., the secret shares pack values using a bivariate polynomial (to pack a matrix instead of a vector)?
Ordinary's user avatar
  • 321
2 votes
1 answer
103 views

I find it confusing when the papers in MPC say we use the underlying protocol in the black box way or if they say we rely on the protocol in the non-black box manner. How do I myself identify if it is ...
Crypto_Research's user avatar
1 vote
0 answers
44 views

In MPC, I have seen papers stating 2 round MPC without round collapsing. What is the difference between round collapsing compiler and without round collapsing compiler?
Crypto_Research's user avatar
0 votes
0 answers
57 views

I am looking for a way to find median and mode securely between two parties having list of numbers. I am eager to know if I can find the median using only secure addition and secure multiplication (...
Divyam's user avatar
  • 1
1 vote
1 answer
166 views

I’ve implemented a 2-party computation (2PC) engine myself and I don’t want to reimplement a front-end/circuit generator. I’m looking for a compiler or tool that takes a high-level description (or an ...
Aura Were's user avatar
1 vote
0 answers
78 views

Do we need now to think about post-quantum MPC protocols? If I understand correctly, now there are a lot of information theoretically secure schemes, however, they have some limitations. On the other ...
tuner007's user avatar
1 vote
0 answers
49 views

Suppose that we are performing a matrix multiplication $A \times A$ ($\in \mathbb{R}^{m \times n}$) using Replicated Secret Sharing (RSS); how should we define the MAC Tag for this multiplication, ...
ShokofehVS's user avatar
1 vote
1 answer
104 views

MPC in general considers $n$ distrusting parties, each having their respective inputs and they collaboratively compute function $f$ on their inputs preserving privacy of parties input and correctness ...
Crypto_Research's user avatar
0 votes
0 answers
60 views

Background I’m implementing Asynchronous Distributed Key Generation (ADKG) over secp256k1 so that N nodes collectively hold a threshold private key. After DKG each node has a secret share. To sign an ...
Shubham Gupta's user avatar

15 30 50 per page
1
2 3 4 5
38