Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a into the sharings of the bits of a in con-stant rounds, which is called the bit-decomposition protocol. The bit-decomposition protocol is a very powerful tool because it enables bit-oriented operations even if shared secrets are given as elements in the field. However, the bit-decomposition protocol is relatively expensive. In this paper, we present a simplified bit-decomposition protocol by an-alyzing the original protocol. Moreover, we construct more efficient pro-tocols for a comparison, interval test and equality test of shared secrets without relying on the bit-decomposition protocol though it seems es-sential to such bit-oriented operat...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Yao’s classical millionaires’ problem is about securely determining whether x¿>¿y, given two inpu...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. Secure multiparty computation (MPC) allows multiple par-ties to evaluate functions without...
The goal of this paper is to introduce a simple verifiable secret sharing scheme, and to improve the...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Yao’s classical millionaires’ problem is about securely determining whether x¿>¿y, given two inpu...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. Secure multiparty computation (MPC) allows multiple par-ties to evaluate functions without...
The goal of this paper is to introduce a simple verifiable secret sharing scheme, and to improve the...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Yao’s classical millionaires’ problem is about securely determining whether x¿>¿y, given two inpu...