We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmically with n (ignoring an additive term that depends on n but not on the complexity of f). Moreover, the protocol is also nearly optimal in terms of resilience, providing computational security against an active, adaptive adversary corrupting a (1/2 - ε) fraction of the players, for an arbitrary ε > 0. © International Association for Cryptologic Research 2008.
CITATION STYLE
Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B., & Smith, A. (2008). Scalable multiparty computation with nearly optimal work and resilience. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5157 LNCS, pp. 241–261). https://doi.org/10.1007/978-3-540-85174-5_14
Mendeley helps you to discover research relevant for your work.