Abstract. We study the design of efficient and private protocols for polynomial operations in the shared-coefficients setting. We propose efficient protocols for polynomial multiplication, division with remainder, polynomial interpolation, polynomial gcd, and a few other operations. All the protocols introduced in this paper are constant-round, and more efficient than the general MPC. The protocols are all composable, and can be combined to perform more complicated functionalities. We focus on using a threshold additively homomorphic public key scheme due to the applications of our protocols. But, our protocols can also be securely computed in the information-theoretic setting. Finally, we mention some applications of our protocols to priva...
Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and uplo...
We consider the problem of secure and private multiparty computation (MPC), in which the goal is to ...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
In many important applications, a collection of mutually distrustful parties must perform private co...
In many important applications, a collection of mutually distrustful parties must perform private co...
This study concentrates on preserving privacy in a network of agents where each agent desires to eva...
In many private set operations, a set is represented by a polynomial over a ring $\Z_{\sigma}$ for a...
Abstract. Privacy preserving multiset union (PPMU) protocol allows a set of parties, each with a mul...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
This electronic version was submitted by the student author. The certified thesis is available in th...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Private set intersection (PSI) allows participants to securely compute the intersection of their inp...
Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and uplo...
We consider the problem of secure and private multiparty computation (MPC), in which the goal is to ...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
In many important applications, a collection of mutually distrustful parties must perform private co...
In many important applications, a collection of mutually distrustful parties must perform private co...
This study concentrates on preserving privacy in a network of agents where each agent desires to eva...
In many private set operations, a set is represented by a polynomial over a ring $\Z_{\sigma}$ for a...
Abstract. Privacy preserving multiset union (PPMU) protocol allows a set of parties, each with a mul...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
This electronic version was submitted by the student author. The certified thesis is available in th...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
Private set intersection (PSI) allows participants to securely compute the intersection of their inp...
Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and uplo...
We consider the problem of secure and private multiparty computation (MPC), in which the goal is to ...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...