Cryptography with weights: MPC, encryption and signatures
From MaRDI portal
Publication:6186595
DOI10.1007/978-3-031-38557-5_10OpenAlexW4385654138MaRDI QIDQ6186595
Rohit Sinha, Abhishek Jain, Sanjam Garg, Mingyuan Wang, Pratyay Mukherjee, Yinuo Zhang
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38557-5_10
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Distributed systems (68M14)
Cites Work
- Unnamed Item
- Unnamed Item
- An application of ramp schemes to broadcast encryption
- A full proof of the BGW protocol for perfectly secure multiparty computation
- Monotone circuits for monotone weighted threshold functions
- Weighted threshold secret sharing schemes
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- Order-C secure multiparty computation for highly repetitive circuits
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles
- Fluid MPC: secure multiparty computation with dynamic participants
- Unconditional communication-efficient MPC via Hall's marriage theorem
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- Secret-sharing schemes for general and uniform access structures
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- Chinese remaindering with errors
- Security of Ramp Schemes
- How to share a secret
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- Scalable Multiparty Computation with Nearly Optimal Work and Resilience
- A Pseudorandom Generator from any One-way Function
- How to Share a Secret
- A modular approach to key safeguarding
- Better secret sharing via robust conditional disclosure of secrets
- Breaking the circuit-size barrier in secret sharing
- On the Power of Nonlinear Secret-Sharing
- Progress in Cryptology - INDOCRYPT 2003
- Theory of Cryptography
This page was built for publication: Cryptography with weights: MPC, encryption and signatures