Computing Functions of a Shared Secret
From MaRDI portal
Cited in
(11)- scientific article; zbMATH DE number 1962157 (Why is no real title available?)
- Cutting-edge cryptography through the lens of secret sharing
- Cutting-edge cryptography through the lens of secret sharing
- Secure computation with preprocessing via function secret sharing
- Multi-recipient and threshold encryption based on hidden multipliers
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Performing computations on hierarchically shared secrets
- How to share a function securely
- Shared generation of pseudo-random functions
- Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
- Theory of Cryptography
This page was built for publication: Computing Functions of a Shared Secret
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4490789)