拖债
发表于 2025-3-30 09:30:29
http://reply.papertrans.cn/17/1673/167240/167240_51.png
Omniscient
发表于 2025-3-30 14:11:46
Secure Multiparty Computation with Identifiable Abort via Vindicating Release one cheating party if the protocol does not produce an output. Known MPC constructions with IA rely on generic zero-knowledge proofs, adaptively secure oblivious transfer (OT) protocols, or homomorphic primitives, and thus incur a substantial penalty with respect to protocols that abort without ide
colloquial
发表于 2025-3-30 19:34:22
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicablyice provider is often interested in computing various data analyses over the private data of its users, which in turn have their incentives to cooperate, but do not necessarily trust the service provider..In this work, we introduce the . (GMPC) to realistically capture the above scenario. The GMPC m
blister
发表于 2025-3-30 23:45:49
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codesgs . of each input . and then adding them together over some Abelian group into an output encoding ., which reveals nothing but the result. In . ARE (RARE) the sum of any subset of ., reveals only the residual function obtained by restricting the corresponding inputs. The appeal of (R)ARE comes from
fluffy
发表于 2025-3-31 03:32:58
Fully Secure MPC and zk-FLIOP over Rings: New Constructions, Improvements and Extensionsks have closed the gap between full security and semi-honest security, by introducing protocols where the parties first compute the circuit using a semi-honest protocol and then run a verification step with sublinear communication in the circuit size. However, in these works the number of interactio
水槽
发表于 2025-3-31 08:43:47
http://reply.papertrans.cn/17/1673/167240/167240_56.png
背书
发表于 2025-3-31 09:46:51
http://reply.papertrans.cn/17/1673/167240/167240_57.png
恶臭
发表于 2025-3-31 14:08:33
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPChe entire witness? Can a set of parties run a multiparty computation (MPC) protocol in the RAM model, without necessarily even reading their entire inputs? We show how to construct such “doubly efficient” schemes in a setting where parties can preprocess their input offline, but subsequently they ca
休息
发表于 2025-3-31 20:55:28
Improved Alternating-Moduli PRFs and Post-quantum Signatureste them using secure multi-party computation (MPC). The alternating moduli paradigm of Boneh et al. (TCC 2018) enables the construction of various symmetric key primitives with the common characteristic that the inputs are multiplied by two linear maps over different moduli, first over . and then ov