Optimizing Semi-Honest Secure Multiparty Computation for the Internet

@inproceedings{BenEfraim2016OptimizingSS,
  title={Optimizing Semi-Honest Secure Multiparty Computation for the Internet},
  author={Aner Ben-Efraim and Yehuda Lindell and Eran Omri},
  booktitle={ACM CCS 2016},
  year={2016}
}
In the setting of secure multiparty computation, a set of parties with private inputs wish to compute some function of their inputs without revealing anything but their output. Over the last decade, the efficiency of secure two-party computation has advanced in leaps and bounds, with speedups of some orders of magnitude, making it fast enough to be of use in practice. In contrast, progress on the case of multiparty computation (with more than two parties) has been much slower, with very little… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 22 extracted citations

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

IEEE Transactions on Information Forensics and Security • 2018
View 7 Excerpts
Highly Influenced

Efficient Maliciously Secure Multiparty Computation for RAM

IACR Cryptology ePrint Archive • 2017
View 9 Excerpts
Method Support
Highly Influenced

Fast Secure Computation for Small Population over the Internet

ACM Conference on Computer and Communications Security • 2018
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-9 of 9 references

How to generate and exchange secrets

27th Annual Symposium on Foundations of Computer Science (sfcs 1986) • 1986
View 18 Excerpts
Highly Influenced

FairplayMP: a system for secure multi-party computation

ACM Conference on Computer and Communications Security • 2008
View 10 Excerpts
Highly Influenced

Fairplay - Secure Two-Party Computation System

USENIX Security Symposium • 2004
View 19 Excerpts
Highly Influenced

More efficient oblivious transfer and extensions for faster secure computation

ACM Conference on Computer and Communications Security • 2013
View 6 Excerpts
Highly Influenced