Efficient secure two-party exponentiation
From MaRDI portal
Publication:3073692
DOI10.1007/978-3-642-19074-2_2zbMATH Open1284.94149OpenAlexW2113761519MaRDI QIDQ3073692FDOQ3073692
Authors: Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_2
Recommendations
- Efficient two-party exponentiation from quotient transfer
- Secure multiplication of shared secrets in the exponent
- Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
- Two-round multiparty secure computation minimizing public key operations
- Faster secure two-party computation in the single-execution setting
Cites Work
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Founding Cryptography on Oblivious Transfer – Efficiently
- Secure Arithmetic Computation with No Honest Majority
- Efficient, Robust and Constant-Round Distributed RSA Key Generation
- Secure multiparty computation goes live
- Privacy preserving data mining
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2006
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- Theory of Cryptography
- Title not available (Why is that?)
- Theory of Cryptography
Cited In (6)
- Practically efficient secure distributed exponentiation without bit-decomposition
- An improvement of multi-exponentiation with encrypted bases argument: smaller and faster
- Two-party ECDSA from hash proof systems and efficient instantiations
- Secure multiplication of shared secrets in the exponent
- Efficient two-party exponentiation from quotient transfer
- Amortizing division and exponentiation
This page was built for publication: Efficient secure two-party exponentiation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073692)