all InfoSec news
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
July 24, 2023, 7:54 a.m. |
IACR News www.iacr.org
ePrint Report: Secure Multiparty Computation with Identifiable Abort from Vindicating Release
Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
In the dishonest-majority setting, generic secure multiparty computation (MPC) protocols are fundamentally vulnerable to attacks in which malicious participants learn their outputs and then force the protocol to abort before outputs are delivered to the honest participants. In other words, generic MPC protocols typically guarantee security with abort.
This flavor of security permits denial-of-service attacks in many applications, unless the cheating …
attacks computation eprint report jack learn malicious mpc protocol protocols release report secure multiparty computation vulnerable
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 12 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 12 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
1 day, 18 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
1 day, 18 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
1 day, 18 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Red Team Penetration Tester and Operator, Junior
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)
Director, Security Operations & Risk Management
@ Live Nation Entertainment | Toronto, ON
IT and Security Specialist APAC (F/M/D)
@ Flowdesk | Singapore, Singapore, Singapore
Senior Security Controls Assessor
@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States
GRC Systems Solution Architect
@ Deloitte | Midrand, South Africa
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States