Paper 2010/106
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgård, Yuval Ishai, and Mikkel Krøigaard
Abstract
We study the following two related questions:
- What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority?
- What are the minimal resources required for two-party primitives such as zero-knowledge proofs and general secure two-party computation?
We obtain a nearly tight answer to the first question by presenting a perfectly secure protocol which allows
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Full version of Eurocrypt 2010 paper
- Keywords
- multiparty computation
- Contact author(s)
- mk @ cs au dk
- History
- 2010-03-01: received
- Short URL
- https://ia.cr/2010/106
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/106, author = {Ivan Damgård and Yuval Ishai and Mikkel Krøigaard}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/106}, year = {2010}, url = {https://eprint.iacr.org/2010/106} }