[Resource Topic] 2014/858: Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds

Welcome to the resource topic for 2014/858

Title:
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds

Authors: Dana Dachman-Soled, Jonathan Katz, Vanishree Rao

Abstract:

Cryptographic protocols with adaptive security ensure that security holds against an adversary who can dynamically determine which parties to corrupt as the protocol progresses—or even after the protocol is finished. In the setting where all parties may potentially be corrupted, and secure erasure is not assumed, it has been a long-standing open question to design secure-computation protocols with adaptive security running in constant rounds. Here, we show a constant-round, universally composable protocol for computing any functionality, tolerating a malicious, adaptive adversary corrupting any number of parties. Interestingly, our protocol can compute all functionalities, not just adaptively well-formed ones.

ePrint: https://eprint.iacr.org/2014/858

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .