Simplified VSS and fast-track multiparty computations with applications to threshold cryptography

From MaRDI portal
Revision as of 16:34, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2790105

DOI10.1145/277697.277716zbMath1333.94036DBLPconf/podc/GennaroRR98OpenAlexW2036133214WikidataQ56806885 ScholiaQ56806885MaRDI QIDQ2790105

Michael O. Rabin, Tal Rabin, Rosario Gennaro

Publication date: 2 March 2016

Published in: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/277697.277716




Related Items (31)

YOSO: You only speak once. Secure MPC with stateless ephemeral rolesFluid MPC: secure multiparty computation with dynamic participantsZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsImplementing secure reporting of sexual misconduct -- revisiting WhoTooSecure Multi-party ShufflingConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsSecure multi-party computation in large networksHow to deal with malicious users in privacy‐preserving distributed data miningDetect, pack and batch: perfectly-secure MPC with linear communication and constant expected timeAsymptotically free broadcast in constant expected time via packed VSSOn multiparty garbling of arithmetic circuitsConstructing ideal secret sharing schemes based on Chinese remainder theoremCryptography and cryptographic protocolsRealistic versus Rational Secret SharingImproved building blocks for secure multi-party computation based on secret sharing with honest majorityMulti-party computation with conversion of secret sharingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecret-Sharing Schemes: A SurveyA full proof of the BGW protocol for perfectly secure multiparty computationMPC vs. SFE : Unconditional and Computational SecurityBlock cipher invariants as eigenvectors of correlation matricesVSS Made SimplerThreshold secret sharing with geometric algebrasPolynomial Evaluation and Side Channel AnalysisEfficient perfectly secure computation with optimal resilienceEfficient perfectly secure computation with optimal resilienceReducing the Complexity in the Distributed Computation of Private RSA KeysTrinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable ComputationLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingSecure distributed storage and retrievalPractically Efficient Secure Single-Commodity Multi-market Auctions







This page was built for publication: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography