Practically efficient secure distributed exponentiation without bit-decomposition
From MaRDI portal
Publication:2656944
Recommendations
- Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
- Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decomposition
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values
- Efficient secure two-party exponentiation
Cited in
(5)- Efficient two-party exponentiation from quotient transfer
- \textsf{Through the looking-glass}: benchmarking secure multi-party computation comparisons for \textsf{ReLU}'s
- Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decomposition
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- Amortizing division and exponentiation
This page was built for publication: Practically efficient secure distributed exponentiation without bit-decomposition
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2656944)