Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computation (MPC). Given a sharing of secret x, it allows the parties to compute the sharings of the bits of x in constant rounds. With the help of bit-decomposition, constant-rounds protocols for various MPC problems can be constructed. However, bit-decomposition is relatively expensive, so constructing protocols for MPC problems without relying on bit-decomposition is a meaningful work. In multi-party computation, it remains an open problem whether the modulo reduction problem can be solved in constant rounds without bit-decomposition. In this paper, we propose a protocol for (public) modulo reduction without relying on bit-decomposition. This prot...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
AbstractWe prove in this paper that it is much harder to evaluate depth-2, size-N circuits with MOD ...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
The multiparty multiplication of two polynomially shared values over Zq with a public prime number q...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
AbstractWe prove in this paper that it is much harder to evaluate depth-2, size-N circuits with MOD ...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
The multiparty multiplication of two polynomially shared values over Zq with a public prime number q...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. Secure multi-party computation (MPC) allows a set of n players to securely compute an agre...