<--- Back to Details
First PageDocument Content
Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce
Date: 2015-04-14 07:10:50
Secure multi-party computation
Standard model
Homomorphic encryption
Pseudorandom generator
Cryptographic primitive
Commitment scheme
Information-theoretic security
Goldwasser–Micali cryptosystem
Secret sharing
Cryptography
Cryptographic protocols
Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 933,16 KB

Share Document on Facebook

Similar Documents

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

DocID: 1xUA8 - View Document

Cryptography / Public-key cryptography / Secret sharing / Secure multi-party computation / Cryptographic protocol / Ivan Damgrd

Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

DocID: 1xTf5 - View Document

Computing / Computer programming / Arrays / Computer performance / Lookup table / Software optimization / Microsoft Basic 1.0 / LiangBarsky algorithm

Homework 1 Cryptography CS 598 : Spring 2016 Released: Thu Jan 21 Due: Tue Feb 2 Exercise on Secret Sharing

DocID: 1vnNK - View Document

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices Erinn Atwater and Ian Goldberg University of Waterloo, Ontario, Canada {erinn.atwater,iang}@uwaterloo.ca

DocID: 1uO4X - View Document

1 Secret Sharing with Optimal Decoding and Repair Bandwidth Wentao Huang and Jehoshua Bruck

DocID: 1uIPQ - View Document