• Publications
  • Influence
Complete Fairness in Secure Two-Party Computation
TLDR
In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. Expand
  • 117
  • 20
  • PDF
Rational Secret Sharing, Revisited
TLDR
We show a protocol for rational secret sharing among n rational players, where it is simpler than the Halpern-Teague solution. Expand
  • 191
  • 16
  • PDF
A Group Signature Scheme from Lattice Assumptions
TLDR
We give the first construction of a group signature scheme based on lattices (more precisely, the learning with errors assumption), in the random oracle model. Expand
  • 180
  • 12
  • PDF
Partial Fairness in Secure Two-Party Computation
TLDR
A protocol for secure two-party computation is fair if either both parties learn the output or else neither party does. Expand
  • 79
  • 11
  • PDF
Secure two-party computation in sublinear (amortized) time
TLDR
We present an approach to secure two-party computation that yields protocols running in sublinear time, in an amortized sense, for functions that can be computed in sub linear time on a random-access machine (RAM). Expand
  • 151
  • 10
  • PDF
Complete Fairness in Multi-Party Computation Without an Honest Majority
TLDR
We initiate a study of complete fairness in the multi-party case and demonstrate the first completely-fair protocols for non-trivial functions in this setting. Expand
  • 39
  • 7
  • PDF
Multimodal communication of wolf spiders on different substrates: evidence for behavioural plasticity
Communication in complex environments poses challenges of potential loss of intended messages, but some animals may compensate by using multimodal signalling. Courtship displays of male SchizocosaExpand
  • 83
  • 4
Constant-Round MPC with Fairness and Guarantee of Output Delivery
TLDR
We study the round complexity of multiparty computation with fairness and guaranteed output delivery, assuming existence of an honest majority. Expand
  • 48
  • 4
  • PDF
Secure Computation of MIPS Machine Code
TLDR
We propose a new system that can securely execute native MIPS code with no special annotations. Expand
  • 26
  • 4
  • PDF
Multimodal signals increase active space of communication by wolf spiders in a complex litter environment
Multimodal signals may compensate for environmental constraints on communication, as signals in different modalities vary in efficacy. We examined the influence of complex microhabitats onExpand
  • 35
  • 3