Sciweavers

30 search results - page 1 / 6
» Concurrently Secure Computation in Constant Rounds
Sort
View
FOCS
2003
IEEE
14 years 4 months ago
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds
We consider the problem of constructing a general protocol for secure two-party computation in a way that preserves security under concurrent composition. In our treatment, we foc...
Rafael Pass, Alon Rosen
IACR
2011
89views more  IACR 2011»
12 years 10 months ago
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit...
CRYPTO
2001
Springer
144views Cryptology» more  CRYPTO 2001»
14 years 3 months ago
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may ar...
Yehuda Lindell
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 3 months ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai