In this work we present secure two-party protocols for various core problems in linear algebra. Our main building block is a protocol to obliviously decide singularity of an encrypted matrix: Bob holds an n × n matrix M, encrypted with Alice’s secret key, and wants to learn whether the matrix is singular or not (and nothing beyond that). We give an interactive protocol between Alice and Bob that solves the above problem with optimal communication complexity while at the same time achieving low round complexity. More precisely, the number of communication rounds in our protocol is polylog(n) and the overall communication is roughly O(n 2) (note that the input size is n 2). At the core of our protocol we exploit some nice mathematical propert...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
International audienceCertificates to a linear algebra computation are additional data structures fo...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Cramer and Damg\aa{}rd were the first to propose a constant-rounds protocol for securely solving a l...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Finding the singularity of a matrix is a basic problem in linear algebra. Chu and Schnitger [3] firs...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
In a linear programming for horizontally partitioned data, the equality constraint matrix is divided...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
International audienceCertificates to a linear algebra computation are additional data structures fo...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Cramer and Damg\aa{}rd were the first to propose a constant-rounds protocol for securely solving a l...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Human identification protocols are challenge-response protocols that rely on human computational abi...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Finding the singularity of a matrix is a basic problem in linear algebra. Chu and Schnitger [3] firs...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
In a linear programming for horizontally partitioned data, the equality constraint matrix is divided...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
International audienceCertificates to a linear algebra computation are additional data structures fo...