We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP computes. First, we expand the construction proposed by Cramer et al. for multiplying two different general access structures and we prove some properties of the resulting MSP. We prove that using two (different) MSPs to compute their resulting MSP is more efficient than building a multiplicative MSP. Next we define a (strongly) multiplicative resulting MSP and we prove that when one uses dual MSPs ...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
Abstract. In this paper we provide several known and one new constructions of new linear secret shar...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
Abstract. In this paper we provide several known and one new constructions of new linear secret shar...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
Abstract. In this paper we provide several known and one new constructions of new linear secret shar...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...