We present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure can be converted into shares from any linear scheme for the same structure. We show how this can be combined with any pseudorandom function to create, from initially distributed randomness, any number of Shamir secret-sharings of (pseudo)random values without communication. We apply this technique to obtain efficient non-interactiveprotocols for secure computation of low-degree polynomials, which in turn give rise to other applications in secure computation...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
We propose and analyze a simple strategy for constructing 1-key constrained pseudorandom functions (...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
AbstractIn Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random f...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
Abstract. Secret sharing schemes divide a secret among multiple par-ticipants so that only authorize...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We revisit the concept of non-malleable secret sharing (Goyal and Kumar, STOC 2018) in the computati...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
We propose and analyze a simple strategy for constructing 1-key constrained pseudorandom functions (...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Abstract. In this paper, we investigate the problem of increasing the threshold parameter of the Sha...
AbstractIn Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random f...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
Abstract. Secret sharing schemes divide a secret among multiple par-ticipants so that only authorize...
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, th...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...