Efficient Conversion of Secret-shared Values Between Different Fields
暂无分享,去创建一个
[1] Ivan Damgård,et al. Non-interactive Proofs for Integer Multiplication , 2007, EUROCRYPT.
[2] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] I. Damglurd. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation , 2006 .
[5] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[6] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.