#### Filter Results:

- Full text PDF available (61)

#### Publication Year

1981

2017

- This year (1)
- Last 5 years (24)
- Last 10 years (40)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Data Set Used

#### Key Phrases

#### Method

Learn More

- Martin Hirt, Kazue Sako
- EUROCRYPT
- 2000

Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority voting protocol of Benaloh and Tuinstra and demonstrate that this protocol is not receiptfree, opposed to what was claimed in the paper and was believed before. Furthermore, we… (More)

- Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin
- EUROCRYPT
- 1999

We consider veriiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we rst observe that a… (More)

Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function, even when up to t players are under the control of an adversary. Known perfectly secure MPC protocols require communication of at least Ω(n) field elements per multiplication, whereas cryptographic or unconditional security is possible with communication… (More)

Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an (active or passive) adversary. In the information-theoretic model MPC is possible if and only if t < n/2 (where active security with t ≥ n/3 requires a trusted key setup). Known passive… (More)

- Martin Hirt, Ueli Maurer
- Journal of Cryptology
- 2000

The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party among the players. Indeed, by the same means, one can simulate an arbitrary player in any given protocol. We formally define what it means to simulate a player by a multiparty… (More)

- Kevin L Tang, Mary K Agnew, +11 authors Richard L Mayden
- Molecular phylogenetics and evolution
- 2010

The members of the cyprinid subfamily Danioninae form a diverse and scientifically important group of fishes, which includes the zebrafish, Danio rerio. The diversity of this assemblage has attracted much scientific interest but its monophyly and the relationships among its members are poorly understood. The phylogenetic relationships of the Danioninae are… (More)

- Matthias Fitzi, Martin Hirt
- PODC
- 2006

All known protocols for Byzantine agreement (BA) among <i>n</i> players require the message to be communicated at least Ω(<i>n</i><sup>2</sup>) times, which results in an overall communication complexity of at least Ω(<i>l</i><i>n</i><sup>2</sup>) bits for an <i>l</i>-bit message. We present the first BA protocol in which the message is… (More)

- Martin Hirt, Ueli Maurer
- PODC
- 1997

The classical results in unconditional multi-party computation among a set of n players state that less than n/2 passive or Iess than n/3 active adversaries can be tolerated; assuming a broadcast channel the threshold for active adversaries is ta/2. Strictly generalizing these results we specify the set of potential y misbehaving players as an arbitrary set… (More)

- Zuzana Beerliová-Trubíniová, Martin Hirt
- ASIACRYPT
- 2007

Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversary. Known asynchronous MPC protocols require communication of at least Ω(n) (with cryptographic security), respectively Ω(n) (with information-theoretic security, but with error… (More)

- Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
- ICALP
- 2008

We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexityO(cnκ) bits, which improves on the previously known solutions by a factor of Ω(n).… (More)