Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical primitive upon which secure multi-party computation (MPC) can be based and which was introduced by Cramer, Damgaard and Maurer (EUROCRYPT 2000). Chen and Cramer pro-posed a special class of such schemes that is constructed from algebraic geometry and that enables efficient secure multi-party computation over fixed finite fields (CRYPTO 2006). We extend this in four ways. First, we propose an abstract coding-theoretic framework in which this class of schemes and its (asymptotic) properties can be cast and analyzed. Sec-ond, we show that for every finite field Fq, there exists an infinite family of LSSS over Fq that is asymptotically good in th...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Secure Multi-Party Computation (MPC) providing information theoretic security allows a set of n part...