2018
DOI: 10.1007/978-3-030-03332-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation with Low Communication from Cross-Checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 33 publications
0
25
0
Order By: Relevance
“…1) Efficient 4PC Protocol: We propose an efficient four-party protocol with active security which proceeds through a masked evaluation inspired by Gordon et al [26]. Our protocol requires 3 ring elements in the online phase per multiplication as opposed to 4 of [26], achieving a 25% improvement. This improvement is achieved by not compromising on the total cost (6 ring elements).…”
Section: A Our Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…1) Efficient 4PC Protocol: We propose an efficient four-party protocol with active security which proceeds through a masked evaluation inspired by Gordon et al [26]. Our protocol requires 3 ring elements in the online phase per multiplication as opposed to 4 of [26], achieving a 25% improvement. This improvement is achieved by not compromising on the total cost (6 ring elements).…”
Section: A Our Contributionmentioning
confidence: 99%
“…Another significant advantage of our protocol is that the fourth party is not required for evaluation in the online phase. This is not the case with [26], where all the parties need to be online throughout the protocol execution. In addition to the stated contributions, our framework also achieves fairness without affecting the complexity of a multiplication gate.…”
Section: A Our Contributionmentioning
confidence: 99%
See 3 more Smart Citations