Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243801
|View full text |Cite
|
Sign up to set email alerts
|

An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 21 publications
1
16
0
Order By: Relevance
“…It is allowed that the offline phase is more costly as it can be run for a long time before the online phase. For the offline phase, many state-of-the-art offline protocols [4,7] are perfectly compatible with our solutions. .…”
Section: In the Malicious Adversary Setting [S]mentioning
confidence: 90%
See 2 more Smart Citations
“…It is allowed that the offline phase is more costly as it can be run for a long time before the online phase. For the offline phase, many state-of-the-art offline protocols [4,7] are perfectly compatible with our solutions. .…”
Section: In the Malicious Adversary Setting [S]mentioning
confidence: 90%
“…The communication complexity of each of above operations could be linear with number of parties if we pick proper sub-protocols (e.g. [4]). The overall round complexity is O(log(max(e i ))+log(n)) considering both the computation of [r ei ] and the multiplication of all [r ei i ] can be parallelized.…”
Section: Offline Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, benchmarks can provide insight into a framework's strengths and weaknesses, and do have value if they are not used as a sole measure of a framework's contribution. Recent work by Barak et al [8] provides an approach for performance comparison between frameworks with compatible architectures.…”
Section: Standardization and Benchmarksmentioning
confidence: 99%
“…An important research focus in making MPCaaS practical has been to reduce the necessary trust assumptions to a minimum. Malicious-case security for confidentiality and integrity guarantees has now become a standard feature of most implementations [8], [9], [10], [11], and protocols like Honeybad-gerMPC [4] and Blinder [12] furthermore guarantee availability in this setting as well.…”
Section: Introductionmentioning
confidence: 99%