Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multi-party computation protocols. However, it remains open whether or not there exist efficient constructions of strongly multiplicative LSSS from general LSSS. In this paper, we propose the new concept of 3-multiplicative LSSS, and establish its relationship with strongly multiplicative LSSS. More precisely, we show that any 3-multiplicative LSSS is a strongly multiplicative LSSS, but the converse is not true; and that any strongly multiplicative LSSS can be efficiently converted into a 3-multiplicative LSSS. Furthermore, we apply 3-multiplicative LSSS to the computation of unbounded fan-in multiplication, which reduces its round...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing sc...
Abstract. We consider a generalized adaptive and active adversary model for unconditionally secure M...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC),...
Abstract. This work deals with “MPC-friendly ” linear secret sharing schemes (LSSS), a mathematical ...
In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold lin...
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set o...
A secret sharing scheme is a method of distributing a secret among a group of participants in such a...
We consider a generalized adaptive and active adversary model for unconditionally secure Multi-Party...
We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have go...
AbstractIn multi-secret sharing schemes, publishing shares during the process of reconstructing part...
The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryp...
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some...