Computing Functions of a Shared Secret
From MaRDI portal
Cited in
(11)- How to share a function securely
- Secure computation with preprocessing via function secret sharing
- Cutting-edge cryptography through the lens of secret sharing
- Cutting-edge cryptography through the lens of secret sharing
- Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
- Performing computations on hierarchically shared secrets
- Multi-recipient and threshold encryption based on hidden multipliers
- Theory of Cryptography
- Shared generation of pseudo-random functions
- scientific article; zbMATH DE number 1962157 (Why is no real title available?)
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
This page was built for publication: Computing Functions of a Shared Secret
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4490789)