The round complexity of verifiable secret sharing and secure multicast

From MaRDI portal
Publication:5176016

DOI10.1145/380752.380853zbMath1317.68072OpenAlexW2033376960MaRDI QIDQ5176016

Tal Rabin, Yuval Ishai, Eyal Kushilevitz, Rosario Gennaro

Publication date: 27 February 2015

Published in: Proceedings of the thirty-third annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/380752.380853




Related Items

Broadcast-optimal two round MPC with an honest majorityImproving the round complexity of VSS in point-to-point networksPaillier-based publicly verifiable (non-interactive) secret sharingDynamic and Verifiable Hierarchical Secret SharingVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Asymptotically free broadcast in constant expected time via packed VSSRound-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)Four-round black-box non-malleable schemes from one-way permutationsPerfect MPC over layered graphsAlmost-surely terminating asynchronous Byzantine agreement against general adversaries with optimal resilienceSecure message transmission in asynchronous networksVerifiable secret sharing in a total of three roundsPerennial secure multi-party computation of universal Turing machineAsynchronous Byzantine agreement with optimal resilienceEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceEfficient asynchronous verifiable secret sharing and multiparty computationVerifiable quantum secret sharing based on a single quditOn the exact round complexity of secure three-party computationTowards a scalable and robust DHTOn expected constant-round protocols for Byzantine agreementGoing beyond dual execution: MPC for functions with efficient verificationTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesAn information theoretically secure e-lottery scheme based on symmetric bivariate polynomialsMPC with friends and foesDynamic threshold secret reconstruction and its application to the threshold cryptographyBroadcast-optimal two-round MPC



Cites Work