General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
Top Cited Papers
- 12 May 2000
- book chapter
- Published by Springer Nature
- p. 316-334
- https://doi.org/10.1007/3-540-45539-6_22
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Foundations of Secure Interactive ComputingPublished by Springer Nature ,2001
- Efficient Multiparty Computations Secure Against an Adaptive AdversaryPublished by Springer Nature ,1999
- Efficient Byzantine agreement secure against general adversariesPublished by Springer Nature ,1998
- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?Published by Springer Nature ,1998
- Quorum-based secure multi-party computationPublished by Springer Nature ,1998
- Adaptively secure multi-party computationPublished by Association for Computing Machinery (ACM) ,1996
- Committed Oblivious Transfer and Private Multi-Party ComputationPublished by Springer Nature ,1995
- A construction of practical secret sharing schemes using linear block codesPublished by Springer Nature ,1993
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985