Publicly verifiable homomorphic secret sharing for polynomial evaluation

X Chen, LF Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
There are two main security concerns in outsourcing computations. One is how to protect the
privacy of the outsourced data, and the other is how to ensure the correctness of the …

Two-server verifiable homomorphic secret sharing for high-degree polynomials

X Chen, LF Zhang - … Security: 23rd International Conference, ISC 2020 …, 2020 - Springer
Homomorphic secret sharing (HSS) allows multiple input clients to secret-share their data
among multiple servers such that each server is able to locally compute a function on its …

Verifiable homomorphic secret sharing for low degree polynomials

X Chen, LF Zhang, J Liu - IEEE Transactions on Dependable …, 2022 - ieeexplore.ieee.org
An-homomorphic secret sharing (HSS) scheme for a function family allows clients to share
their data among servers and then distribute the computation of any function to the servers …

Verifiable homomorphic secret sharing

G Tsaloli, B Liang, A Mitrokotsa - International Conference on Provable …, 2018 - Springer
In this paper, we explore the multi-server (ie, multiple servers are employed to perform
computations) and multi-client (ie, multiple clients outsource joint computations on their joint …

Sum it up: Verifiable additive homomorphic secret sharing

G Tsaloli, A Mitrokotsa - International Conference on Information Security …, 2019 - Springer
In many situations, clients (eg, researchers, companies, hospitals) need to outsource joint
computations based on joint inputs to external cloud servers in order to provide useful …

Homomorphic secret sharing for low degree polynomials

RWF Lai, G Malavolta, D Schröder - … on the Theory and Application of …, 2018 - Springer
Homomorphic secret sharing (HSS) allows n clients to secret-share data to m servers, who
can then homomorphically evaluate public functions over the shares. A natural application is …

A geometric approach to homomorphic secret sharing

Y Ishai, RWF Lai, G Malavolta - IACR International Conference on Public …, 2021 - Springer
Abstract An (n, m, t)-homomorphic secret sharing (HSS) scheme allows n clients to share
their inputs across m servers, such that the inputs are hidden from any t colluding servers …

Batch verifiable computation of polynomials on outsourced data

LF Zhang, R Safavi-Naini - … Symposium on Research in Computer Security, 2015 - Springer
Secure outsourcing of computation to cloud servers has attracted much attention in recent
years. In a typical outsourcing scenario, the client stores its data on a cloud server and later …

Outsourcing secret sharing scheme based on homomorphism encryption

E Zhang, J Peng, M Li - IET Information Security, 2018 - Wiley Online Library
Secret sharing is an important component of cryptography protocols and has a wide range of
practical applications. However, the existing secret sharing schemes cannot apply to …

Practical and provably secure distributed aggregation: Verifiable additive homomorphic secret sharing

G Tsaloli, G Banegas, A Mitrokotsa - Cryptography, 2020 - mdpi.com
Often clients (eg, sensors, organizations) need to outsource joint computations that are
based on some joint inputs to external untrusted servers. These computations often rely on …