2017
DOI: 10.1007/978-3-319-70694-8_21
|View full text |Cite
|
Sign up to set email alerts
|

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer

Abstract: In this work, we present two new universally composable, actively secure, constant round multi-party protocols for generating BMR garbled circuits with free-XOR and reduced costs. 1. Our first protocol takes a generic approach using any secret-sharing based MPC protocol for binary circuits, and a correlated oblivious transfer functionality.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 55 publications
(15 citation statements)
references
References 40 publications
(45 reference statements)
0
15
0
Order By: Relevance
“…Following our work, there has been renewed interest in the BMR protocol. First and foremost, the works of [25,16] build directly on this work and show how to construct the BMR garbled circuit more efficiently. In addition, [3] considered the semi-honest setting, and [21] apply an optimized version of our construction to efficient RAM-based MPC.…”
Section: Our Contributionmentioning
confidence: 99%
“…Following our work, there has been renewed interest in the BMR protocol. First and foremost, the works of [25,16] build directly on this work and show how to construct the BMR garbled circuit more efficiently. In addition, [3] considered the semi-honest setting, and [21] apply an optimized version of our construction to efficient RAM-based MPC.…”
Section: Our Contributionmentioning
confidence: 99%
“…Our multiparty GC-based protocol is a combination, with some extensions, of protocols described in [14,16,19,28]. We let K = F 2 κ be a finite field, recall we use K = F 2 128 in our implementation.…”
Section: Bmr-style Mpc For Binary Circuitsmentioning
confidence: 99%
“…In the passively secure two party case this idea goes back to Yao [29], which was generalised to the honest-majority multi-party setting by Beaver et al [3]. Recently, there has been renewed interest in n-party activelysecure protocols in this paradigm, such as [16,28]. The focus in these newer protocols is almost always on full-threshold access structures.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations