Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is an Fq-linear secret sharing scheme where the secret is selected from Fkq and each of the n shares is an element of Fq. Moreover, there is t-privacy (in addition, any t shares are uniformly ran-dom in Ftq) and, if one considers the d-fold “component-wise ” product of any d sharings, then the d-fold component-wise product of the d respec-tive secrets is (n − t)-wise uniquely determined by it. Such schemes are a fundamental primitive in information-theoretically secure multi-party computation. Perhaps counter-intuitively, secure multi-party computa-tion is a very powerful primitive for communication-efficient two-party cryptography, as shown rece...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
An $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\Fq^k$ over $\Fq$ is an $\...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
The Ihara limit (or constant) A(q) has been a central problem of study in the asymptotic theory of g...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
This electronic version was submitted by the student author. The certified thesis is available in th...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
AbstractThree-level secret sharing schemes arising from the vector space construction over a finite ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
An $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\Fq^k$ over $\Fq$ is an $\...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
The Ihara limit (or constant) A(q) has been a central problem of study in the asymptotic theory of g...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
This electronic version was submitted by the student author. The certified thesis is available in th...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
AbstractThree-level secret sharing schemes arising from the vector space construction over a finite ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...