A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Secure Arithmetic Computation with No Honest Majority
[chapter]
2009
Lecture Notes in Computer Science
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of two-party protocols with security against malicious parties, our main goals are to: (1) only make black-box calls to the ring operations and standard cryptographic primitives, and (2) minimize the number of such black-box calls as well as the communication overhead. We present several solutions which differ in their
doi:10.1007/978-3-642-00457-5_18
fatcat:njbxeax5xrfsdpnmikxxbwexc4