Skip to main content

Advances, Systems and Applications

Table 2 This is an additional description of Table 1

From: Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

Setup size

Setup type

Computation Complexity

Assumptions

poly(k, d)

Threshold PKI

\(poly(l_{in},l_{out},k,d,n)\)

LWE, NIZK

–

–

poly(|C|, k)

PKE and zaps

poly(k, d)

CRS

\(poly(l_{in},l_{out},k,d,n)\)

LWE, NIZK

–

–

poly(|C|, k)

VSS

\(poly(l_{in},k,d,n)\)

CRS

\(poly(l_{in},l_{out},k,d,n)\)

LWE, NIZK

poly(|C|, k)

Ref

poly(|C|, k)

OWF, iO

poly(k)

CRS

\(poly(l_{in},l_{out},k,d,n)\)

LWE, NIZK