2017
DOI: 10.1007/978-3-319-56614-6_8
|View full text |Cite
|
Sign up to set email alerts
|

High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
101
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(106 citation statements)
references
References 20 publications
0
101
0
Order By: Relevance
“…In [21], the time to produce a multiplication triple for p ≈ 2 64 is estimated as 2ms for covert security and 6ms for fully malicious security (with two parties, with η = 40). We presume that the cost is smaller for smaller p, but for p ≈ 2 32 , it should not be more than twice as fast. On the other hand, the increase of η to 80 would double the costs [21].…”
Section: Complexity Of Actively Secure Integer Multiplication and Aesmentioning
confidence: 93%
See 2 more Smart Citations
“…In [21], the time to produce a multiplication triple for p ≈ 2 64 is estimated as 2ms for covert security and 6ms for fully malicious security (with two parties, with η = 40). We presume that the cost is smaller for smaller p, but for p ≈ 2 32 , it should not be more than twice as fast. On the other hand, the increase of η to 80 would double the costs [21].…”
Section: Complexity Of Actively Secure Integer Multiplication and Aesmentioning
confidence: 93%
“…For honest majority and three parties, a recent method [32] proposes the use of a highly efficient passively secure protocol for precomputing multiplication triples. Again, this method only allows the detection of misbehaviour, but no identification of the guilty party.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our protocol is MPC-agnostic, meaning that it does not depend on the solution that implements the MPC functionality; example protocols that could be executed within our protocol are SPDZ [16] or MASCOT [32]. However, the three-party protocol for Boolean circuits that was introduced by Araki et al [3,23] is fairly suited for our current needs, given its performance and threshold properties. Hence, we use this protocol in our simulation.…”
Section: Cryptographic Building Blocksmentioning
confidence: 99%
“…The scheme provides threshold security against semi-honest and malicious parties. Note that Furukawa et al [23] further adapt the protocol to provide security against a malicious adversary.…”
Section: Cryptographic Building Blocksmentioning
confidence: 99%