This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. In the work of [Abs+19a, TCC’19], a protocol based on the Shamir secret sharing over Z/ pℓZ was presented. As in the field case, its limitation is that the share size grows as the number of players increases. Then several MPC protocols were developed in [Abs+20, Asiacrypt’20] to overcome this limitation. However, (i) their offline multiplication gate has super-linear communication complexity in the number of players; (ii) the share size is doubled for the most important case, namely over Z/ 2 ℓZ due to infeasible lifting of self-orthogonal codes from fields to rings; (iii) most importantly, the BGW model could not be applied via the secret sh...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We present a very simple yet very powerful idea for turning any passively secure MPC protocol into a...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
In 2016, Guruswami and Wootters showed Shamir’s secret-sharing scheme defined over an extension fiel...
We construct the first efficient MPC protocol that only requires black-box access to a non-commutati...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
Multiparty computation (MPC) over rings such as Z232 or Z264 has received a great deal of attention ...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
At CRYPTO 2018, Cascudo et al. introduced Reverse Multiplication Friendly Embeddings (RMFEs). These ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We present a very simple yet very powerful idea for turning any passively secure MPC protocol into a...
This paper studies information-theoretically secure multiparty computation (MPC) over rings Z/ pℓZ. ...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPD2k that allows fo...
In 2016, Guruswami and Wootters showed Shamir’s secret-sharing scheme defined over an extension fiel...
We construct the first efficient MPC protocol that only requires black-box access to a non-commutati...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
Multiparty computation (MPC) over rings such as Z232 or Z264 has received a great deal of attention ...
Unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties t...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Since the mid 2000s, asymptotically-good strongly-multiplicative linear (ramp) secret sharing scheme...
At CRYPTO 2018, Cascudo et al. introduced Reverse Multiplication Friendly Embeddings (RMFEs). These ...
In this invited talk,1 we introduce the notion of arithmetic codex, or codex for short. It encompass...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We present a very simple yet very powerful idea for turning any passively secure MPC protocol into a...