Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector consisting of the coordinatewise product of two respective share-vectors. This paper focuses on the following foundational question, which is novel to the best of our knowledge. Suppose we abandon the latter linearity condition and instead require that this product is obtained by some, not-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counteri...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn ...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some ...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
The t,n secret sharing scheme is used to protect the privacy of information by distribution. More sp...
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn ...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
All known constructions of information theoretic t-out-of-n secret sharing schemes require secure, ...