scientific article

From MaRDI portal
Publication:3374918

zbMath1082.94515MaRDI QIDQ3374918

Ronald Cramer, Ueli M. Maurer, Ivan B. Damgård

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (80)

Multi-party revocation in sovrin: performance through distributed trustEfficient information-theoretic multi-party computation over non-commutative ringsAsymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCThe quadratic hull of a code and the geometric view on multiplication algorithmsSecret-sharing schemes for very dense graphsZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher callsMeasuring, simulating and exploiting the head concavity phenomenon in BKZImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsHow to Share a Secret, InfinitelyPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Secret Sharing Schemes with Algebraic Properties and ApplicationsOn the (in)efficiency of non-interactive secure multiparty computationImproving the round complexity of VSS in point-to-point networksAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsSecure multi-party computation protocol for sequencing problemAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdA group identification protocol with leakage resilience of secret sharing schemeOn \(d\)-multiplicative secret sharingProperties of constacyclic codes under the Schur productSecret sharing schemes with strong multiplication and a large number of players from toric varietiesLocal bounds for the optimal information ratio of secret sharing schemesDetect, pack and batch: perfectly-secure MPC with linear communication and constant expected timeOn the information ratio of non-perfect secret sharing schemesQuantum multi-party private set union protocol based on least common multiple and Shor’s algorithmCoset bounds for algebraic geometric codesAsymptotically free broadcast in constant expected time via packed VSSRevisiting group oriented secret sharing schemesPerfect MPC over layered graphsBivariate polynomial-based secret sharing schemes with secure secret reconstructionIdeal uniform multipartite secret sharing schemesAsymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation methodRound-efficient Byzantine agreement and multi-party computation with asynchronous fallbackOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceMultiplicative and verifiably multiplicative secret sharing for multipartite adversary structuresSecret sharing on regular bipartite access structuresConstructing ideal secret sharing schemes based on Chinese remainder theoremOptimal linear multiparty conditional disclosure of secrets protocolsThe optimal linear secret sharing scheme for any given access structureMethods of encrypting monotonic access structuresFoundations of Homomorphic Secret SharingOn Linear Secret Sharing for Connectivity in Directed GraphsA note on ramp secret sharing schemes from error-correcting codesError decodable secret sharing and one-round perfectly secure message transmission for general adversary structuresExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecret-Sharing Schemes: A SurveyIdeal Secret Sharing Schemes for Useful Multipartite Access StructuresSecure Outsourced ComputationProcessing secure, verifiable and efficient SQL over outsourced databaseConstruction of arithmetic secret sharing schemes by using torsion limitsActively secure garbled circuits with constant communication overhead in the plain modelSecure multi-party computation made simpleEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceSecret sharing schemes based on graphical codesStrongly Multiplicative and 3-Multiplicative Linear Secret Sharing SchemesGraph Design for Secure Multiparty Computation over Non-Abelian GroupsStrong \((n, t, n)\) verifiable secret sharing schemeEfficient Simultaneous BroadcastOT-Combiners via Secure ComputationLinear multi-secret sharing schemes based on multi-party computationSecure publicly verifiable and proactive secret sharing schemes with general access structureStrongly Multiplicative Ramp Schemes from High Degree Rational Points on CurvesEfficient perfectly secure computation with optimal resilienceEfficient perfectly secure computation with optimal resilienceСхема разделения секрета типа схемы Блэкли, основанная на пересечении подпространствSquares of matrix-product codesBlackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemesGeneric Constant-Round Oblivious Sorting Algorithm for MPCRound-efficient perfectly secure message transmission scheme against general adversaryHigh dimensional affine codes whose square has a designed minimum distanceCounting Method for Multi-party Computation over Non-abelian GroupsA Single Initialization Server for Multi-party CryptographyEfficient explicit constructions of compartmented secret sharing schemesAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackEfficient oblivious evaluation protocol and conditional disclosure of secrets for DFAUnnamed ItemCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmicsOn Secret Sharing with Nonlinear Product ReconstructionOblivious transfer based on single-qubit rotationsNew \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system




This page was built for publication: