Understand the security provided by MPC implementations
8
Our Results Give "end-to-end" security proofs for protocols based on fixed-key block ciphers
9
Correlation robustness (informal)
10
Fixed-key AES and the RPM
11
Constructing a CR hash function
12
Efficiency
13
Follow-up work
Description:
Explore a 17-minute IEEE conference talk on efficient and secure multiparty computation using fixed-key block ciphers. Delve into the comprehensive study of utilizing fixed-key block ciphers for secure computation, particularly in OT extension and circuit garbling. Learn about various notions of pseudorandomness for hash functions and their provably secure schemes for different applications. Discover provably secure constructions of hash functions in the random-permutation model. Gain insights into end-to-end security proofs for secure-computation protocols based on fixed-key block ciphers, which surprisingly also offer performance improvements. Understand the importance of correlation robustness, fixed-key AES, and the random permutation model in constructing efficient and secure hash functions for multiparty computation.
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers