Foundations of Homomorphic Secret Sharing

From MaRDI portal
Publication:4993284

DOI10.4230/LIPIcs.ITCS.2018.21zbMath1462.94053OpenAlexW2783978526MaRDI QIDQ4993284

Huijia Lin, Elette Boyle, Niv Gilboa, Stefano Tessaro, Yuval Ishai

Publication date: 15 June 2021

Full work available at URL: https://drops.dagstuhl.de/opus/volltexte/2018/8365/pdf/LIPIcs-ITCS-2018-21.pdf/




Related Items (29)

Three-round secure multiparty computation from black-box two-round oblivious transferEvolving homomorphic secret sharing for hierarchical access structuresLarge message homomorphic secret sharing from DCR and applicationsTwo-round MPC: information-theoretic and black-boxTwo-round adaptively secure multiparty computation from standard assumptionsTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsCNF-FSS and Its ApplicationsFrom FE combiners to secure MPC and backFully homomorphic NIZK and NIWI proofsSublinear-communication secure multiparty computation does not require FHEOn homomorphic secret sharing from polynomial-modulus LWERound-optimal black-box secure computation from two-round malicious OTScooby: improved multi-party homomorphic secret sharing based on FHEEncryption to the future. A paradigm for sending secret messages to future (anonymous) committeesTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?Quadratic multiparty randomized encodings beyond honest majority and their applicationsScooby: improved multi-party homomorphic secret sharing based on FHEMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNMulti-client oblivious RAM with poly-logarithmic communicationHomomorphic secret sharing for low degree polynomialsAn optimal distributed discrete log protocol with applications to homomorphic secret sharingFormalisation of Bayesian concealmentThe rise of Paillier: homomorphic secret sharing and public-key silent OTThreshold garbled circuits and ad hoc secure computationA geometric approach to homomorphic secret sharingBETA: biometric-enabled threshold authenticationAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation



Cites Work


This page was built for publication: Foundations of Homomorphic Secret Sharing