We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k + O(Dn2)k + poly(n/t), where C is the number of gates in the circuit, n is the number of parties, k is the bitlength of the elements of the field over which the computation is carried out, D is the multiplicative depth of the circuit, and k is the security parameter. The corruption threshold is t
CITATION STYLE
Damgård, I., & Nielsen, J. B. (2007). Scalable and unconditionally secure multiparty computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4622 LNCS, pp. 572–590). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_32
Mendeley helps you to discover research relevant for your work.