In this work, we introduce the Gulliver multi-party computation model (G...
In the setting of secure multiparty computation (MPC), a set of mutually...
A two-party coin-flipping protocol is ϵ-fair if no efficient
adversary c...
Let π be an efficient two-party protocol that given security parameter
κ...
In his seminal work, Cleve [STOC '86] has proved that any r-round
coin-f...
A major challenge in the study of cryptography is characterizing the
nec...