On the complexity of verifiable secret sharing and multiparty computation
From MaRDI portal
Publication:3192000
DOI10.1145/335305.335343zbMATH Open1296.94149OpenAlexW2031137180MaRDI QIDQ3192000FDOQ3192000
Ronald Cramer, Stefan Dziembowski, Ivan B. Damgård
Publication date: 26 September 2014
Published in: Proceedings of the thirty-second annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/335305.335343
Recommendations
- The Round Complexity of Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- Computational verifiable secret sharing revisited
- scientific article; zbMATH DE number 1676641
- On the message complexity of secure multiparty computation
- Efficient asynchronous verifiable secret sharing and multiparty computation
- Secure multiparty computation and secret sharing
- Tight bounds on the randomness complexity of secure multiparty computation
- The bottleneck complexity of secure multiparty computation
- The round complexity of verifiable secret sharing: the statistical case
Cited In (7)
- Applied Cryptography and Network Security
- A secret-sharing based MPC protocol for Boolean circuits with good amortized complexity
- On the message complexity of secure multiparty computation
- Advances in Cryptology - EUROCRYPT 2004
- General secure multi-party computation from any linear secret-sharing scheme
- Title not available (Why is that?)
- A generalization of Bernstein-Vazirani algorithm with multiple secret keys and a probabilistic oracle
This page was built for publication: On the complexity of verifiable secret sharing and multiparty computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3192000)