Abstract
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not require expensive zero-knowledge proofs and its communication complexity does not depend on the computational complexity of the underlying cryptographic primitive. Our protocol withstands an active, adaptive adversary corrupting a minority of the parties. Previous constant-round protocols of this type were only known in the semi-honest model or for restricted classes of functionalities. © International Association for Cryptologic Research 2005.
Cite
CITATION STYLE
Damgård, I., & Ishai, Y. (2006). Constant-round multiparty computation using black-box pseudorandom generator. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3621 LNCS, pp. 378–394). https://doi.org/10.1007/11535218_23
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.