The square root is an important mathematical primitive whose secure, efficient, distributed computation has so far not been possible. We present a solution to this problem based on Goldschmidt's algorithm. The starting point is computed by linear approximation of the normalized input using carefully chosen coefficients. The whole algorithm is presented in the fixed-point arithmetic framework of Catrina/Saxena for secure computation. Experimental results demonstrate the feasibility of our algorithm and we show applicability by using our protocol as a building block for a secure QR-Decomposition of a rational-valued matrix
This document presents two novel techniques for Multi-Party Computation based on secret sharing wher...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elli...
The square root is an important mathematical primitive whose secure, efficient, distributed computat...
Abstract. The square root is an important mathematical primitive whose secure, efficient, distribute...
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation ...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Cramer and Damg\aa{}rd were the first to propose a constant-rounds protocol for securely solving a l...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This paper considers three algorithms for the extraction of square roots of complex integers {called...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
This document presents two novel techniques for Multi-Party Computation based on secret sharing wher...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elli...
The square root is an important mathematical primitive whose secure, efficient, distributed computat...
Abstract. The square root is an important mathematical primitive whose secure, efficient, distribute...
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation ...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Cramer and Damg\aa{}rd were the first to propose a constant-rounds protocol for securely solving a l...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This paper considers three algorithms for the extraction of square roots of complex integers {called...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
This document presents two novel techniques for Multi-Party Computation based on secret sharing wher...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elli...