Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE

@inproceedings{Asharov2011MultipartyCW,
  title={Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE},
  author={Gilad Asharov and Abhishek Jain and Daniel Wichs},
  booktitle={IACR Cryptology ePrint Archive},
  year={2011}
}
Fully homomorphic encryption (FHE) enables secure computation over the encrypted data of a single party. We explore how to extend this to multiple parties, using threshold fully homomorphic encryption (TFHE). In such scheme, the parties jointly generate a common FHE public key along with a secret key that is shared among them; they can later cooperatively decrypt ciphertexts without learning anything but the plaintext. We show how to instantiate this approach efficiently, by extending the… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 157 CITATIONS

Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security

Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
  • IACR Cryptology ePrint Archive
  • 2019
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Advances in Cryptology – CRYPTO 2017

  • Lecture Notes in Computer Science
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND & RESULTS
HIGHLY INFLUENCED

Advances in Cryptology – CRYPTO 2016

  • Lecture Notes in Computer Science
  • 2016
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

The Exact Round Complexity of Secure Computation

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Constant-Round MPC with Fairness and Guarantee of Output Delivery

  • IACR Cryptology ePrint Archive
  • 2015
VIEW 8 EXCERPTS
CITES BACKGROUND, RESULTS & METHODS
HIGHLY INFLUENCED

Advances in Cryptology – EUROCRYPT 2014

  • Lecture Notes in Computer Science
  • 2014
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Advances in Cryptology - ASIACRYPT 2013

  • Lecture Notes in Computer Science
  • 2013
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Between a Rock and a Hard Place: Interpolating Between MPC and FHE

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Multi-Key Homomophic Encryption from TFHE

  • IACR Cryptology ePrint Archive
  • 2019
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

On Two Round Rerunnable MPC Protocols

  • IACR Cryptology ePrint Archive
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2011
2019

CITATION STATISTICS

  • 14 Highly Influenced Citations

  • Averaged 25 Citations per year from 2017 through 2019