Secure Computation Under Network and Physical Attacks

Alessandra Scafuro


Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network connection or physical weaknesses of the honest parties’ machine.
This article provides an overview of the results for achieving secure computation in presence of concurrent and physical attacks contained in the phD thesis:”Secure Computation under concurrent and physical attacks", with emphasis to the relation of such results with the state of the art.

Full Text:



  • There are currently no refbacks.