Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing schemes over a fixed finite field have turned out as a central theoretical primitive in numerous constant-communication-rate results in multi-party cryptographic scenarios, and, surprisingly, in two-party cryptography as well. Known constructions of this most powerful class of arithmetic secret sharing schemes all rely heavily on algebraic geometry (AG), i.e., on dedicated AG codes based on asymptotically good towers of algebraic function fields defined over finite fields. It is a well-known open question since the first (explicit) constructions of such schemes appeared in CRYPTO 2006 whether the use of “heavy machinery” can be avoided here. i.e., ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
An $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\Fq^k$ over $\Fq$ is an $\...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this work, we consider the leakage-resilience of algebraic-geometric (AG for short) codes based r...
An $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\Fq^k$ over $\Fq$ is an $\...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by...
We prove that a known general approach to improve Shamir’s celebrated secret sharing scheme; i.e., a...
Shamir\u27s celebrated secret sharing scheme provides an efficient method for encoding a secret of a...
Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbi...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
We prove that a known approach to improve Shamir\u27s celebrated secret sharing scheme; i.e., adding...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...