Group: Cryptography Research
It is often the case that mutually distrustful parties need to perform a joint computation but cannot afford to reveal their inputs to each other. This can occur, for example, during auctions, data mining, voting, negotiations and business analytics. Secure multi-party computation (MPC) allows a set of parties, each with a private input, to securely and jointly perform any computation over their inputs.
On February 20-21, 2014 we held a Workshop on Applied Multi-Party Computation.
- Seny Kamara and Lei Wei, Garbled circuits via structured encryption, in Financial Cryptography and Data Security, pp. 177–188, Springer, April 2013.
- Seny Kamara, Payman Mohassel, and Ben Riva, Salus: a system for server-aided secure function evaluation, in Proceedings of the 2012 ACM conference on Computer and communications security, October 2012.
- Nishanth Chandran, Juan Garay, and Rafail Ostrovsky, Edge fault tolerance on sparse networks, in Automata, Languages, and Programming, pp. 452–463, Springer, July 2012.
- Seny Kamara, Payman Mohassel, and Mariana Raykova, Outsourcing Multi-Party Computation., in IACR Cryptology ePrint Archive, May 2011.