Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually dis-trustful players to perform correct, distributed computa-tions under the sole assumption that some number of them will follow the protocol honestly. This paper investigates how much trust is necessary – that is, how many play-ers must remain honest – in order for distributed quantum computations to be possible. We present a verifiable quantum secret sharing (VQSS) protocol, and a general secure multiparty quantum com-putation (MPQC) protocol, which can tolerate any bn−12 c cheaters among n players. Previous protocols for these tasks tolerated bn−14 c and bn−16 c cheaters, re...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
In the (t, n) threshold quantum secret sharing scheme, it is difficult to ensure that internal parti...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
It is a standard result in the theory of quantum error-correcting codes that no code of length n can...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
I construct a secure multiparty scheme to compute a classical function by a succinct use of a specia...
We consider the task of secure multiparty distributed quantum computation on a quantum network. We p...
A recent result by Dulek et al. (EUROCRYPT 2020) showed a secure protocol for computing any quantum ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
In the (t, n) threshold quantum secret sharing scheme, it is difficult to ensure that internal parti...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
It is a standard result in the theory of quantum error-correcting codes that no code of length n can...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
I construct a secure multiparty scheme to compute a classical function by a succinct use of a specia...
We consider the task of secure multiparty distributed quantum computation on a quantum network. We p...
A recent result by Dulek et al. (EUROCRYPT 2020) showed a secure protocol for computing any quantum ...
A fundamental task in modern cryptography is the joint computation of a function which has two input...
27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) p...
In the (t, n) threshold quantum secret sharing scheme, it is difficult to ensure that internal parti...