all InfoSec news
Towards Practical Topology-Hiding Computation
Aug. 29, 2022, 10:48 a.m. |
IACR News www.iacr.org
ePrint Report: Towards Practical Topology-Hiding Computation
Shuaishuai Li
\par Topology-hiding computation (THC) enables $n$ parties to perform a secure multiparty computation (MPC) protocol in an incomplete communication graph while keeping the communication graph hidden. The work of Akavia et al. (CRYPTO 2017 and JoC 2020) shown that THC is feasible for any graph. In this work, we focus on the efficiency of THC and give improvements for various tasks including broadcast, sum and general computation. We mainly consider THC on …
More from www.iacr.org / IACR News
Warsaw IACR Summer School on Post-Quantum Cryptography
1 day, 11 hours ago |
www.iacr.org
ICMS ZKP Workshop: Foundations and Applications of Zero-Knowledge Proofs
2 days, 11 hours ago |
www.iacr.org
RWC 2026: Real World Crypto Symposium
2 days, 11 hours ago |
www.iacr.org
RWC 2025: Real World Crypto Symposium
2 days, 11 hours ago |
www.iacr.org
Indocrypt 2024: 25th International Conference on Cryptology in India
2 days, 11 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cloud Technical Solutions Engineer, Security
@ Google | Mexico City, CDMX, Mexico
Assoc Eng Equipment Engineering
@ GlobalFoundries | SGP - Woodlands
Staff Security Engineer, Cloud Infrastructure
@ Flexport | Bellevue, WA; San Francisco, CA
Software Engineer III, Google Cloud Security and Privacy
@ Google | Sunnyvale, CA, USA
Software Engineering Manager II, Infrastructure, Google Cloud Security and Privacy
@ Google | San Francisco, CA, USA; Sunnyvale, CA, USA