The multiparty multiplication of two polynomially shared values over Zq with a public prime number q is an important module in distributed computations. The mul-tiplication protocol of Gennaro, Rabin and Rabin (1998) is considered as the best protocol for this purpose. It re-quires a complexity of O(n2k log n + nk2) bit-operations per player, where k is the bit size of the prime q and n is the number of players. The present paper reduces this complex-ity to O(n2k + nk2) by using Newton’s classical interpola-tion formula. The impact of the new method on distributed signatures is outlined. 1
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
We study the following two related questions: - What are the minimal computational resources require...
Summary. In the light of information security it is highly desirable to avoid a “single point of fai...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
The distributed matrix multiplication problem with an unknown number of stragglers is considered, wh...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
This document presents two novel techniques for Multi-Party Computation based on secret sharing wher...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We put forward a new approach for the design of efficient multiparty protocols: 1. Design a protocol...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
We study the following two related questions: - What are the minimal computational resources require...
Summary. In the light of information security it is highly desirable to avoid a “single point of fai...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
The distributed matrix multiplication problem with an unknown number of stragglers is considered, wh...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
This document presents two novel techniques for Multi-Party Computation based on secret sharing wher...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We put forward a new approach for the design of efficient multiparty protocols: 1. Design a protocol...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
We study the following two related questions: - What are the minimal computational resources require...