Going Beyond Dual Execution: MPC for Functions with Efficient Verification
2
Secure Multiparty Computation (MPC)
3
Applications to MPC
4
Protocol Blueprint
5
Yao's 2PC
6
State-of-the-art Yao-style Active 2PC
7
Why concede to leakage?
8
Dual Execution [MF06]
9
Our Results - Active secure 2PC with 1-bit leakage
10
Efficiently Verifiable Functions
11
Theorem 1: Boolean f
12
Theorem 2: Arbitrary f
13
Application: Perfect Matching
Description:
Explore a cutting-edge presentation on secure multiparty computation (MPC) from PKC 2020. Delve into advanced techniques for active secure two-party computation with minimal leakage, focusing on efficiently verifiable functions. Learn about applications to perfect matching, state-of-the-art Yao-style protocols, and innovative approaches that go beyond dual execution. Gain insights into the latest developments in MPC for functions with efficient verification, presented by leading researchers in the field of cryptography.
Going Beyond Dual Execution - MPC for Functions with Efficient Verification