Universally composable efficient multiparty computation from threshold homomorphic encryption

127Citations
Citations of this article
59Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a new general multiparty computation protocol for the cryptographic scenario which is universally composable - in particular, it is secure against an active and adaptive adversary, corrupting any minority of the parties. The protocol is as efficient as the best known statically secure solutions, in particular the number of bits broadcast (which dominates the complexity) is Ω(nk|C|), where n is the number of parties, k is a security parameter, and |C| is the size of a circuit doing the desired computation. Unlike previous adaptively secure protocols for the cryptographic model, our protocol does not use non-committing encryption, instead it is based on homomorphic threshold encryption, in particular the Paillier cryptosystem. © International Association for Cryptologic Research 2003.

Cite

CITATION STYLE

APA

Damgård, I., & Nielsen, J. B. (2003). Universally composable efficient multiparty computation from threshold homomorphic encryption. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2729, 247–264. https://doi.org/10.1007/978-3-540-45146-4_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free