Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields - MaRDI portal

Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields

From MaRDI portal
Publication:5756627

DOI10.1007/11818175_31zbMath1129.94016OpenAlexW1574535057MaRDI QIDQ5756627

Hao Chen, Ronald Cramer

Publication date: 4 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11818175_31




Related Items (39)

Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCThe quadratic hull of a code and the geometric view on multiplication algorithmsSecure computation using leaky correlations (asymptotically optimal constructions)Threshold Secret Sharing Requires a Linear Size AlphabetSecret Sharing Schemes with Algebraic Properties and ApplicationsAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdOn \(d\)-multiplicative secret sharingPrivate set intersection: new generic constructions and feasibility resultsA simple combinatorial treatment of constructions and threshold gaps of ramp schemesOn some bounds for symmetric tensor rank of multiplication in finite fieldsSecret sharing schemes with strong multiplication and a large number of players from toric varietiesLigero: lightweight sublinear arguments without a trusted setupCoset bounds for algebraic geometric codesAccess structures of hyperelliptic secret sharing schemesMore efficient dishonest majority secure computation over \(\mathbb{Z}_{2^k}\) via Galois ringsBilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation methodMultiplicative and verifiably multiplicative secret sharing for multipartite adversary structuresAlgebraic geometric codes with applicationsFoundations of Homomorphic Secret SharingStrongly secure quantum ramp secret sharing constructed from algebraic curves over finite fieldsError decodable secret sharing and one-round perfectly secure message transmission for general adversary structuresExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsEfficient robust secret sharing from expander graphsNearly optimal robust secret sharingActively secure garbled circuits with constant communication overhead in the plain modelSecret sharing schemes based on graphical codesThree-level secret sharing schemes from the twisted cubicStrongly Multiplicative and 3-Multiplicative Linear Secret Sharing SchemesOT-Combiners via Secure ComputationOn the Complexity of Additively Homomorphic UC CommitmentsStrongly Multiplicative Ramp Schemes from High Degree Rational Points on CurvesIsolated Proofs of Knowledge and Isolated Zero KnowledgeRevisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing SchemeSecure Protocol TransformationsOn Constructing Homomorphic Encryption Schemes from Coding TheoryUnnamed ItemOn Secret Sharing with Nonlinear Product ReconstructionThe price of active security in cryptographic protocols




This page was built for publication: Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields