High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority Jun Furukawa*, Yehuda Lindell**, Ariel Nof** and Or Weinstein** *NEC corporation, Israel **Bar-Ilan University, Israel Eurocrypt 2017 Secure Three-Party Computation with an Honest Majority ๐ฅ 1 ๐ฅ 2 ๐(๐ฅ , ๐ฅ , ๐ฅ ) 1 2 3 ๐ฅ 3 Secure Three-Party Computation with an Honest Majority ๐ฅ 1 ๐ฅ 2 ๐(๐ฅ , ๐ฅ , ๐ฅ ) 1 2 3 ๐ฅ 3 Secure Three-Party Computation with an Honest Majority ๐ฅ 1 ๐ฅ 2 ๐(๐ฅ , ๐ฅ , ๐ฅ ) 1 2 3 ๐ฅ 3 โข Functionality is represented by a Boolean circuit โข Security with abort High-Throughput Secure Three-Party Computation with an Honest Majority High-Throughput Secure Three-Party Computation with an Honest Majority ๐ก ๐ ๐ก๐๐๐ก f ๐ก ๐๐๐ How much time it takes to compute a function? High-Throughput Secure Three-Party Computation with an Honest Majority ๐ก ๐ ๐ก๐๐๐ก f ๐ก ๐๐๐ How much time it takes to compute a function? Latency High-Throughput Secure Three-Party Computation with an Honest Majority 1 ๐ ๐๐ f f f ๐ก f ๐ ๐ก๐๐๐ก f ๐ก ๐๐๐ f f f f f How much time it takes to How many functions can we compute a function? compute in one sec? Latency High-Throughput Secure Three-Party Computation with an Honest Majority 1 ๐ ๐๐ f f f ๐ก f ๐ ๐ก๐๐๐ก f ๐ก ๐๐๐ f f f f f How much time it takes to How many functions can we compute a function? compute in one sec? Latency Throughput Low Latency High-Throughput VS. Low Latency High-Throughput
Description: