Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali 2019
DOI: 10.1145/3335741.3335756
|View full text |Cite
|
Sign up to set email alerts
|

Completeness theorems for non-cryptographic fault-tolerant distributed computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
481
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 296 publications
(484 citation statements)
references
References 4 publications
2
481
0
1
Order By: Relevance
“…These n shares are then distributed between n parties. This process is called secret sharing (Ben-Or and Wigderson, 1988). We use a concrete example to better illustrate the secret sharing concept.…”
Section: Traditional Secure Mpcmentioning
confidence: 99%
“…These n shares are then distributed between n parties. This process is called secret sharing (Ben-Or and Wigderson, 1988). We use a concrete example to better illustrate the secret sharing concept.…”
Section: Traditional Secure Mpcmentioning
confidence: 99%
“…Then, it is enough that each worker adds share of A T B with share of C. Following this idea, we can use BGW algorithm to calculate any polynomials of the inputs, with at least 2t − 1 workers. For formal description see [4].…”
Section: ) Phase 3 -Reconstructionmentioning
confidence: 99%
“…An important observation is that SSSS allows each party to locally compute linear combinations of secrets and public values. Firstly, let us define [x] i as the i th share of data item, x. SSSS allows parties to locally compute the following arithmetic operations over their shares [6]: [4]. As opposed to entirely local computation for addition of shares and the addition and multiplication of a share with a constant value, multiplying shares necessitates one round of communication.…”
Section: Mpc From Arithmetic Secretmentioning
confidence: 99%