In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompasses several well-established notions from cryptography (arithmetic secret sharing schemes, which enjoy additive as well as multiplicative properties) and algebraic complexity theory (bilinear complexity of multiplication) in a natural mathematical framework. Arithmetic secret sharing schemes have important applications to secure multi-party computation and even to two-party cryptography. Interestingly, several recent applications to two-party cryptography rely crucially on the existing results on “asymptotically good families” of suitable such schemes. Moreover, the construction of these schemes requires asymptotically good towers of function ...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
This thesis provides a unique cryptosystem comprised of different number theory applications. We fir...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Abstract. Many information theoretically secure protocols are known for general secure multi-party c...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
This survey discusses theories of bounded arithmetic, growth rates of definable functions, natural p...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
This thesis provides a unique cryptosystem comprised of different number theory applications. We fir...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Abstract. Many information theoretically secure protocols are known for general secure multi-party c...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
This survey discusses theories of bounded arithmetic, growth rates of definable functions, natural p...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
This thesis provides a unique cryptosystem comprised of different number theory applications. We fir...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...