Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. While much …
In this work, we present two new actively secure, constant round multi-party computation (MPC) protocols with security against …
We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. …
In this work, we present two new actively secure, constant round multi-party computation (MPC)protocols with security against …
We present an actively secure protocol for secure multi-party computation based on lookup tables, by extending the recent, two-party …
A biometric identification method of an entity including computation of a matching value between biometric data of an entity $u$ and …