Paper 2025/200
Improved Secure Two-party Computation from a Geometric Perspective
Abstract
Multiplication and other non-linear operations are widely recognized as the most costly components of secure two-party computation (2PC) based on linear secret sharing. Multiplication and non-linear operations are well known to be the most expensive protocols in secure two-party computation (2PC). Moreover, the comparison protocol (or
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. USENIX Security 2025
- Contact author(s)
-
guohao g @ outlook com
plq270998 @ alibaba-inc com
haiyangxc @ gmail com
jerry pl @ alibaba-inc com
weiran lwr @ alibaba-inc com
sduliuzhe @ gmail com
hulei @ iie ac cn - History
- 2025-02-20: last of 2 revisions
- 2025-02-11: received
- See all versions
- Short URL
- https://ia.cr/2025/200
- License
-
CC BY-NC
BibTeX
@misc{cryptoeprint:2025/200, author = {Hao Guo and Liqiang Peng and Haiyang Xue and Li Peng and Weiran Liu and Zhe Liu and Lei Hu}, title = {Improved Secure Two-party Computation from a Geometric Perspective}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/200}, year = {2025}, url = {https://eprint.iacr.org/2025/200} }