On the Exact Round Complexity of Secure Three-Party Computation

2021 ◽  
Vol 34 (4) ◽  
Author(s):  
Arpita Patra ◽  
Divya Ravi
Keyword(s):  
Author(s):  
Amos Beimel ◽  
Iftach Haitner ◽  
Kobbi Nissim ◽  
Uri Stemmer
Keyword(s):  

1994 ◽  
Vol 1 (39) ◽  
Author(s):  
Ivan B. Damgård ◽  
Oded Goldreich ◽  
Avi Wigderson

In <em>Crypto93</em>, Damgård showed that any constant-round protocol in which the verifier sends only independent, random bits and which is zero-knowledge against the <em>honest</em> verifier can be transformed into a protocol (for the same problem) that is zero-knowledge <em>in general</em>. His transformation was based on the interactive hashing technique of Naor, Ostrovsky, Venkatesan and Yung, and thus the resulting protocol had very large round-complexity.


2019 ◽  
Vol 63 (2) ◽  
pp. 253-266
Author(s):  
Mohammed Haddad ◽  
Colette Johnen ◽  
Sven Köhler

Abstract We present a silent self-stabilizing distributed algorithm computing a maximal $\ p$-star decomposition of the underlying communication network. Under the unfair distributed scheduler, the most general scheduler model, the algorithm converges in at most $12\Delta m + \mathcal{O}(m+n)$ moves, where $m$ is the number of edges, $n$ is the number of nodes and $\Delta $ is the maximum node degree. Regarding the time complexity, we obtain the following results: our algorithm outperforms the previously known best algorithm by a factor of $\Delta $ with respect to the move complexity. While the round complexity for the previous algorithm was unknown, we show a $5\big \lfloor \frac{n}{p+1} \big \rfloor +5$ bound for our algorithm.


2012 ◽  
Vol 59 (5) ◽  
pp. 1-35 ◽  
Author(s):  
Ashwinkumar Badanidiyuru ◽  
Arpita Patra ◽  
Ashish Choudhury ◽  
Kannan Srinathan ◽  
C. Pandu Rangan

1995 ◽  
Vol 145 (1-2) ◽  
pp. 271-290 ◽  
Author(s):  
Ofer Biran ◽  
Shlomo Moran ◽  
Shmuel Zaks
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document