2018
DOI: 10.1007/978-3-319-96878-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Fast Large-Scale Honest-Majority MPC for Malicious Adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
70
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 112 publications
(87 citation statements)
references
References 25 publications
2
70
0
Order By: Relevance
“…Then we will prove that it holds for i = m. In Step 3, we calculate w m = x m − max m−1 . By correctness 18 To argue security, first observe that P 2 learns no information from the protocol (as F DReLU ({P 0 , P 1 }, P 2 ) and F SS ({P 0 , P 1 }, P 2 ) provides outputs only to P 0 and P 1 ). Now, P j , j ∈ {0, 1} only learn fresh shares of the values β i , max i , ind i and hence any information learned by either party can be perfectly simulated through appropriate shares of 0 (over Z L ).…”
Section: Divisionmentioning
confidence: 99%
See 1 more Smart Citation
“…Then we will prove that it holds for i = m. In Step 3, we calculate w m = x m − max m−1 . By correctness 18 To argue security, first observe that P 2 learns no information from the protocol (as F DReLU ({P 0 , P 1 }, P 2 ) and F SS ({P 0 , P 1 }, P 2 ) provides outputs only to P 0 and P 1 ). Now, P j , j ∈ {0, 1} only learn fresh shares of the values β i , max i , ind i and hence any information learned by either party can be perfectly simulated through appropriate shares of 0 (over Z L ).…”
Section: Divisionmentioning
confidence: 99%
“…Secure multi-party computation (MPC) [8,17,25,40] and specifically 3-party computation [6,9,10,14,18,23,28,32] provide a generic solution for the above problem. However, general purpose MPC/3PC work over low-level circuits (either arithmetic or boolean) and for complex tasks such as neural network training, this leads to highly inefficient protocols that can take "forever to execute" (also pointed out by [21,26,33,36]).…”
Section: Introductionmentioning
confidence: 99%
“…However, options for non-continuous crossing alongside options for continuous crossing are offered by some venues, such as LSE's Turquoise and ITG's Posit. Turquoise offers the option of randomised period crossing (where matching is at random intervals between 10-45 seconds, depending upon liquidity) 6 , while the option Posit Match matches orders during a 30-second interval several times a day at pre-determined times [20, p.39].…”
Section: Trading In the Darkmentioning
confidence: 99%
“…Special dark order types that enable volume to be hidden on a lit exchange, e.g., an Iceberg Order, are not included. 6 Turqoise Plato Uncross: https://www.lseg.com/sites/default/files/content/documents/ TURQUOISE_UNCROSS_FACTSHEET_2016_AW.pdf Interestingly, markets have quickly adapted to the DVC by moving volume away from dark pools to newly-popular periodic auction venues [10]. Unlike continuous central limit order books (CLOBs), where trades are executed instantly as soon as there is a match, in a periodic auction, matching only occurs at the end of a call period.…”
Section: Out Of the Dark And Into The Semi-transparentmentioning
confidence: 99%
See 1 more Smart Citation