intmpc_sub(intINPUT_A,intINPUT_B) { returnINPUT_A-INPUT_B; } 步骤1 编译电路(每个function生成一个circ) size-optimized for YAO depth-optimized for GMW and arithmetic circuit 步骤2 协议选择(给出cost function 方便选择某种协议) 步骤3 执行 2. MP-SPDZ A Versatile Framework for Multi-Party Comp...
P. Smart, "Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits," in ESORICS'13.I. Damga˚rd, M. Keller, E. Larraia, V. Pastro, P. Scholl, and N. P. Smart. Practical covertly secure MPC for dishonest majority-or: Breaking the SPDZ limits. In ...
SPDZ2k : Efficient MPC mod 2k for Dishonest Majority Ronald Cramer1,2, Ivan Damg˚ard3(B), Daniel Escudero3, Peter Scholl3, and Chaoping Xing4 1 CWI, Amsterdam, The Netherlands 2 Leiden University, Leiden, The Netherlands 3 Aarhus University, Aarhus, Denmark ivan@cs.au.dk 4 Nanyang ...
(2013). Practical covertly secure mpc for dishonest majority -or: Breaking the spdz limits. In ESORICS.Practical covertly secure mpc for dishonest majority or: Breaking the SPDZ limits - Smart - 2013I. Damg˚ard, M. Keller, E. Larraia, V. Pastro, P. Scholl, and N. P. Smart. ...
P. Smart, "Practical covertly secure MPC for dishonest majority--Or: Breaking the SPDZ limits," in Computer Security (Lecture Notes in Computer Science), vol. 8134. Berlin, Germany: Springer-Verlag, 2013.Damg˚ard, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., and Smart...