Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
暂无分享,去创建一个
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[5] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Yin Li,et al. Secret Shared Random Access Machine , 2015, ALGOCLOUD.
[8] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[9] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[10] Daniele Micciancio,et al. A first glimpse of cryptography's Holy Grail , 2010, CACM.
[11] Ed Dawson,et al. The breadth of Shamir's secret-sharing scheme , 1994, Comput. Secur..
[12] Zvika Brakerski,et al. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.
[13] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[14] Robert M. Gray,et al. Toeplitz and Circulant Matrices: A Review , 2005, Found. Trends Commun. Inf. Theory.
[15] Shlomi Dolev,et al. Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] I. G. MacDonald,et al. Symmetric functions and Hall polynomials , 1979 .
[17] Shlomi Dolev,et al. SSSDB: Database with Private Information Search , 2015, ALGOCLOUD.
[18] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[19] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[20] Shlomi Dolev,et al. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation , 2014, IACR Cryptol. ePrint Arch..