In this paper, we explore the multi-server (i.e., multiple servers are employed to perform computations) and multi-client (i.e., multiple clients outsource joint computations on their joint inputs) scenario that avoids single points of failure and provides higher security and privacy guarantees. More precisely, we introduce the notion of verifiable homomorphic secret sharing (VHSS) for multi-input, that allows n clients to outsource joint computations on their joint inputs to m servers without requiring any communication between the clients or the servers; while providing the verifiable capability to any user to confirm that the final output (rather than each share) is correct. Our contributions are two-fold: (i) we provide a detailed examp...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
The goal of this paper is to introduce a simple verifiable secret sharing scheme, and to improve the...
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on ...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
International audienceWe continue the study of Homomorphic Secret Sharing (HSS), recently introduced...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
The goal of this paper is to introduce a simple verifiable secret sharing scheme, and to improve the...
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on ...
Secure multiparty computation enables a set of users to evaluate certain functionalities on their re...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
International audienceWe continue the study of Homomorphic Secret Sharing (HSS), recently introduced...
Abstract. Multiparty computation can be used for privacy-friendly out-sourcing of computations on pr...
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
Multiparty computation can be used for privacy-friendly outsourcing of computations on private input...
The goal of this paper is to introduce a simple verifiable secret sharing scheme, and to improve the...
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements...