2011
DOI: 10.1007/s10623-011-9515-z
|View full text |Cite
|
Sign up to set email alerts
|

Multi-party computation with conversion of secret sharing

Abstract: Abstract. Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup ('semi-ideal') model, in which the participa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…While the computation of linear function is straightforward, evaluating non-linear terms like x i × x j is subtler. To compute the monomials, each participant needs to receive additional multiplicative shares from other participants using a multiplicative (n, n) secret sharing, so that they could convert multiplicative shares to additive shares [30]. Such a procedure is given in algorithm 1.…”
Section: Computation Of Monomialsmentioning
confidence: 99%
“…While the computation of linear function is straightforward, evaluating non-linear terms like x i × x j is subtler. To compute the monomials, each participant needs to receive additional multiplicative shares from other participants using a multiplicative (n, n) secret sharing, so that they could convert multiplicative shares to additive shares [30]. Such a procedure is given in algorithm 1.…”
Section: Computation Of Monomialsmentioning
confidence: 99%
“…Specifically, in addition to the participant threshold to be satisfied, a transaction can be successful only if r (< t − 1) privileged participants agree the transaction. In the following, we investigate the joint Bitcoin trading in this scenario and present a variant to cater for the privileged participants included in the threshold (Ghodosi et al 2012;Tang 2007). We first describe the "key generation" procedure.…”
Section: System Parametersmentioning
confidence: 99%
“…For this purpose, we use the technique suggested by Ghodosi et al in [13]. 4 This procedure is applied for each entry independently.…”
Section: Fully Masked Designmentioning
confidence: 99%
“…The side-channel literature usually refers to[12] for such a task, but the algorithms in this reference are quite sequential. We focus on the approach suggested in[13] which seems easier to parallelize and simpler in our hardware context.…”
mentioning
confidence: 99%