July 24, 2023, 7:54 a.m. |

IACR News www.iacr.org

ePrint Report: Secure Multiparty Computation with Identifiable Abort from Vindicating Release

Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat


In the dishonest-majority setting, generic secure multiparty computation (MPC) protocols are fundamentally vulnerable to attacks in which malicious participants learn their outputs and then force the protocol to abort before outputs are delivered to the honest participants. In other words, generic MPC protocols typically guarantee security with abort.


This flavor of security permits denial-of-service attacks in many applications, unless the cheating …

attacks computation eprint report jack learn malicious mpc protocol protocols release report secure multiparty computation vulnerable

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States