Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Multiparty Computation and Secret Sharing - MaRDI portal

Secure Multiparty Computation and Secret Sharing

From MaRDI portal
Publication:5500574

DOI10.1017/CBO9781107337756zbMath1322.68003MaRDI QIDQ5500574

Jesper Buus Nielsen, Ronald Cramer, Ivan B. Damgård

Publication date: 6 August 2015





Related Items (44)

Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCThe quadratic hull of a code and the geometric view on multiplication algorithmsCutting-edge cryptography through the lens of secret sharingOblivious transfer in incomplete networksImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsThreshold Secret Sharing Requires a Linear Size AlphabetComplexity and performance of secure floating-point polynomial evaluation protocolsSecret Sharing Schemes with Algebraic Properties and ApplicationsZK-PCPs from leakage-resilient secret sharingAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdEfficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois ringsOptimality of a protocol by Feige-Kilian-Naor for three-party secure computationProperties of constacyclic codes under the Schur productSecret sharing schemes with strong multiplication and a large number of players from toric varietiesComplete characterization of broadcast and pseudo-signatures from correlationsEfficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)Full threshold change range of threshold changeable secret sharingOn secret sharing, randomness, and random-less reductions for secret sharingImproved single-round secure multiplication using regenerating codesPerfect MPC over layered graphsSome new classes of additive MDS and almost MDS codes over finite fieldsMessage randomization and strong security in quantum stabilizer-based secret sharing for classical secretsSecure rational numbers equivalence test based on threshold cryptosystem with rational numbersAn efficient threshold access-structure for RLWE-based multiparty homomorphic encryptionTrojan-resilience without cryptographyPrivacy preserving distributed optimization using homomorphic encryptionA practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationalsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationProbabilistic secret sharingSecure Multi-party Computation: Information Flow of Outputs and Game TheoryON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEMSecure Outsourced ComputationNearly optimal robust secret sharingUnnamed ItemYet another compiler for active security or: efficient MPC over arbitrary ringsA note on secure multiparty computation via higher residue symbolsSquares of matrix-product codesBlackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemesSecure multi-party quantum computation with a dishonest majorityOn the power of multiple anonymous messages: frequency estimation and selection in the shuffle model of differential privacyUnnamed ItemHigh dimensional affine codes whose square has a designed minimum distanceReverse firewalls for actively secure MPCsCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics




This page was built for publication: Secure Multiparty Computation and Secret Sharing