Asymptotically-good arithmetic secret sharing over Z/p^ Z with strong multiplication and its applications to efficient MPC
From MaRDI portal
Publication:2129015
DOI10.1007/978-3-030-84252-9_22zbMATH Open1487.94152OpenAlexW3187633241MaRDI QIDQ2129015FDOQ2129015
Chaoping Xing, Matthieu Rambaud, Ronald Cramer
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_22
Cites Work
- Algebraic Function Fields and Codes
- List decoding of algebraic-geometric codes
- Title not available (Why is that?)
- Multiparty Computation from Somewhat Homomorphic Encryption
- Title not available (Why is that?)
- Secret Sharing Schemes with Algebraic Properties and Applications
- Improved decoding of Reed-Solomon and algebraic-geometry codes
- Modular and \(p\)-adic cyclic codes
- Linear algebra algorithms for divisors on an algebraic curve
- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
- Computing Riemann-Roch spaces in algebraic function fields and related topics.
- Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
- Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
- Perfectly-Secure MPC with Linear Communication Complexity
- Title not available (Why is that?)
- A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound
- Amortized complexity of information-theoretically secure MPC revisited
- Secure Multiparty Computation and Secret Sharing
- \(\mathrm{SPD}\mathbb {Z}_{2^k}\): efficient MPC \(\mod 2^k\) for dishonest majority
- Theory of Cryptography
- Algebraic geometric codes over rings
- Yet another compiler for active security or: efficient MPC over arbitrary rings
- Title not available (Why is that?)
- Secure computation with constant communication overhead using multiplication embeddings
- An efficient passive-to-active compiler for honest-majority MPC over rings
- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
- Constant-overhead unconditionally secure multiparty computation over binary fields
- Guaranteed output delivery comes free in honest majority MPC
- A secret-sharing based MPC protocol for Boolean circuits with good amortized complexity
- Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings
- Asymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- Communication lower bounds for statistically secure MPC, with or without preprocessing
- A fast randomized geometric algorithm for computing Riemann-Roch spaces
- Subquadratic Time Encodable Codes Beating the Gilbert–Varshamov Bound
Cited In (11)
- Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings
- Sharing transformation and dishonest majority MPC with packed secret sharing
- Amortized NISC over \(\mathbb{Z}_{2^k}\) from RMFE
- Degree-\(D\) reverse multiplication-friendly embeddings: constructions and applications
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- Field instruction multiple data
- Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)
- More efficient dishonest majority secure computation over \(\mathbb{Z}_{2^k}\) via Galois rings
- Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
- Fully secure MPC and zk-FLIOP over rings: new constructions, improvements and extensions
- More efficient zero-knowledge protocols over \(\mathbb{Z}_{2^k}\) via Galois rings
This page was built for publication: Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129015)