Sciweavers

94 search results - page 2 / 19
» On the complexity of verifiable secret sharing and multipart...
Sort
View
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
SCN
2010
Springer
129views Communications» more  SCN 2010»
13 years 4 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 6 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
CRYPTO
2006
Springer
232views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
Abstract. We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme...
Hao Chen, Ronald Cramer