Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
DOI10.1109/TIT.2014.2314099zbMATH Open1360.14080arXiv1207.2936OpenAlexW2170763591MaRDI QIDQ2986259FDOQ2986259
Authors: Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Publication date: 16 May 2017
Published in: IEEE Transactions on Information Theory, Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1207.2936
Recommendations
- Construction of arithmetic secret sharing schemes by using torsion limits
- Finite fields, Gröbner bases and modular secret sharing
- Function fields over finite fields and their applications to cryptography
- Field extension in secret-shared form and its applications to efficient secure computation
- Algebraic geometric secret sharing schemes over large fields are asymptotically threshold
- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
- Secret sharing schemes with strong multiplication and a large number of players from toric varieties
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
- On the complexity of arithmetic secret sharing
- scientific article; zbMATH DE number 5066607
Combinatorial codes (94B25) Arithmetic theory of algebraic function fields (11R58) Applications to coding theory and cryptography of arithmetic geometry (14G50) Algebraic functions and function fields in algebraic geometry (14H05) Authentication, digital signatures and secret sharing (94A62)
Cited In (17)
- Gaps between prime numbers and tensor rank of multiplication in finite fields
- On some bounds for symmetric tensor rank of multiplication in finite fields
- A modular interpretation of BBGS towers
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- On the complexity of arithmetic secret sharing
- A new tower with good \(p\)-rank meeting Zink's bound
- Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPC
- Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation method
- On secret sharing with nonlinear product reconstruction
- Construction of arithmetic secret sharing schemes by using torsion limits
- On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry
- More efficient dishonest majority secure computation over \(\mathbb{Z}_{2^k}\) via Galois rings
- Algebraic geometric secret sharing schemes over large fields are asymptotically threshold
- Asymptotically good towers of function fields with small \(p\)-rank
- Tower of algebraic function fields with maximal Hasse-Witt invariant and tensor rank of multiplication in any extension of \(\mathbb{F}_2\) and \(\mathbb{F}_3\)
- On the number of effective divisors in algebraic function fields defined over a finite field
- Secret Sharing Schemes with Algebraic Properties and Applications
This page was built for publication: Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2986259)