Adaptively Secure Multi-party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where the channels are insecure and secur
Main Authors: | , , , |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149820 |
_version_ | 1826211019355062272 |
---|---|
author | Canetti, Ran Feige, Uri Goldreich, Oded Naor, Moni |
author_facet | Canetti, Ran Feige, Uri Goldreich, Oded Naor, Moni |
author_sort | Canetti, Ran |
collection | MIT |
description | A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where the channels are insecure and secur |
first_indexed | 2024-09-23T14:59:13Z |
id | mit-1721.1/149820 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T14:59:13Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1498202023-03-30T03:19:35Z Adaptively Secure Multi-party Computation Canetti, Ran Feige, Uri Goldreich, Oded Naor, Moni A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where the channels are insecure and secur 2023-03-29T15:26:55Z 2023-03-29T15:26:55Z 1996-02 https://hdl.handle.net/1721.1/149820 MIT-LCS-TR-682 application/pdf |
spellingShingle | Canetti, Ran Feige, Uri Goldreich, Oded Naor, Moni Adaptively Secure Multi-party Computation |
title | Adaptively Secure Multi-party Computation |
title_full | Adaptively Secure Multi-party Computation |
title_fullStr | Adaptively Secure Multi-party Computation |
title_full_unstemmed | Adaptively Secure Multi-party Computation |
title_short | Adaptively Secure Multi-party Computation |
title_sort | adaptively secure multi party computation |
url | https://hdl.handle.net/1721.1/149820 |
work_keys_str_mv | AT canettiran adaptivelysecuremultipartycomputation AT feigeuri adaptivelysecuremultipartycomputation AT goldreichoded adaptivelysecuremultipartycomputation AT naormoni adaptivelysecuremultipartycomputation |