We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the set of shares is written [a] p ), it is possible to compute, in constant rounds and with unconditional security, sharings of the bits of a, i.e., compute sharings [a 0] p , ..., [a l-¿-¿1] p such that l = ¿ log2 p ¿, a 0,...,a l¿-¿1¿¿¿{0,1} and a = ¿ i¿=¿0 l-¿-¿1 a i 2 i . Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. The complexity of our protocol is O(l log l)(llogl) invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in O(1)(1) rounds. This result immediately implies solutions to other long-standing open problems...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...