Bit-decomposition of secret shared values – securely computing sharings of the binary representation – is an important primitive in multi-party computation. The problem of performing this task in a constant number of rounds has only recently been solved. This work presents a novel approach at constant-rounds bit-decomposition. The basic idea provides a solution matching the big-O-bound of the original while decreasing the hidden constants. More importantly, further solutions improve asymptotic complexity with only a small increase in constants, reducing it from O(lLog(l)) to O(lLog*(l)) and even lower. Like previous solutions, the present one is unconditionally secure against both active and adaptive adversaries
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...
Bit-decomposition of secret shared values – securely computing sharings of the binary representation...
In the field of signal processing in the encrypted domain, linear operations are usually easy to per...
We show that if a set of players hold shares of a value a Î \mathbbFp aFpfor some prime p (where the...
Bit-decomposition, which is proposed by Damg̊ard et al., is a powerful tool for multi-party computat...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Abstract. Damg̊ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a ...
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of sec...
Abstract. We consider the standard secure multi-party multiplication protocol due to M. Rabin. This ...
We present a constant-round protocol for general secure multiparty computation which makes a black-...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
[出版社版]We improve the upper bound on the round complexity for perfectly concealing bit commitment sch...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
We explicitly show the upper bound on the round complexity for perfectly concealing bit commitment s...