Among secure multi-party computation protocols, linear secret sharing schemes often do not rely on cryptographic assumptions and are among the most straightforward to explain and to implement correctly in software. However, basic versions of such schemes either limit participants to evaluating linear operations involving private values or require those participants to communicate synchronously during a computation phase. A straightforward, information-theoretically secure extension to such schemes is presented that can evaluate arithmetic sum-of-products expressions that contain multiplication operations involving non-zero private values. Notably, this extension does not require that participants communicate during the computation phase. In...
We provide a symbolic model for multi-party computation based on linear secret-sharing scheme, and p...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) t...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
The present report contains a proof of a linear lower bound for a typical three-party secure computa...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We provide a symbolic model for multi-party computation based on linear secret-sharing scheme, and p...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) t...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
Abstract. We consider both information-theoretic and cryptographic settings for Multi-Party Computat...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
We present a construction of log-depth formulae for various threshold functions based on atomic thre...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty comput...
The present report contains a proof of a linear lower bound for a typical three-party secure computa...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We provide a symbolic model for multi-party computation based on linear secret-sharing scheme, and p...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error co...