Secure computation based on leaky correlations: high resilience setting
From MaRDI portal
Publication:1678360
DOI10.1007/978-3-319-63715-0_1zbMath1409.94864OpenAlexW2741318154MaRDI QIDQ1678360
Hai H. Nguyen, Alexander R. Block, Hemanta K. Maji
Publication date: 15 November 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0_1
Related Items (5)
Secure computation using leaky correlations (asymptotically optimal constructions) ⋮ Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\) ⋮ Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family ⋮ Circuit amortization friendly encodingsand their application to statistically secure multiparty computation ⋮ Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
This page was built for publication: Secure computation based on leaky correlations: high resilience setting