2018
DOI: 10.1007/978-3-030-05378-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation with Constant Communication Overhead Using Multiplication Embeddings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 47 publications
0
4
0
Order By: Relevance
“…The notion of reverse multiplication friendly embedding was first explicitly defined and studied in the context of secure computation by Cascudo et al in [8] and independently by Block et al in [5]. The former work is in the context of information-theoretically secure protocols, while the latter studied 2-party protocols over small fields where the assumed resource is OLE over an extension field.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The notion of reverse multiplication friendly embedding was first explicitly defined and studied in the context of secure computation by Cascudo et al in [8] and independently by Block et al in [5]. The former work is in the context of information-theoretically secure protocols, while the latter studied 2-party protocols over small fields where the assumed resource is OLE over an extension field.…”
Section: Related Workmentioning
confidence: 99%
“…For any r ≤ 16, there exists a (2r, 8r) 2 -RMFE. 5 For our numerical comparisons we will mainly consider the constructions with better rate in Theorem 1 and point out that, should one want to use Theorem 2 instead, then some small overhead in communication is introduced.…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations