An $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\Fq^k$ over $\Fq$ is an $\Fq$-linear secret sharing scheme where the secret is selected from $\Fq^k$ and each of the $n$ shares is an element of $\Fq$. Moreover, there is $t$-privacy (in addition, any $t$ shares are uniformly random in $\Fq^t$) and, if one considers the $d$-fold ``component-wise'' product of any $d$ sharings, then the $d$-fold component-wise product of the $d$ respective secrets is $(n-t)$-wise uniquely determined by it. Such schemes are a fundamental primitive in information-theoretically secure multi-party computation. Perhaps counter-intuitively, secure {\em multi-party} computation is a very powerful primitive for {\em communication-ef...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
AbstractThree-level secret sharing schemes arising from the vector space construction over a finite ...
A secret-sharing scheme for a monotone Boolean (access) function $F: \{0,1\}^n \to \{0,1\}$ is a ran...
Producción CientíficaAbstract: In this paper we consider linear secret sharing schemes over a finite...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. An (n, t, d, n−t)-arithmetic secret sharing scheme (with uni-formity) for Fkq over Fq is a...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
AbstractThree-level secret sharing schemes arising from the vector space construction over a finite ...
A secret-sharing scheme for a monotone Boolean (access) function $F: \{0,1\}^n \to \{0,1\}$ is a ran...
Producción CientíficaAbstract: In this paper we consider linear secret sharing schemes over a finite...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
A multi-secret sharing scheme is a protocol to share more than one secret among a set of participan...
This electronic version was submitted by the student author. The certified thesis is available in th...