X Chen, LF Zhang - … Security: 23rd International Conference, ISC 2020 …, 2020 - Springer
Homomorphic secret sharing (HSS) allows multiple input clients to secret-share their data among multiple servers such that each server is able to locally compute a function on its …
X Chen, LF Zhang, J Liu - IEEE Transactions on Dependable …, 2022 - ieeexplore.ieee.org
An-homomorphic secret sharing (HSS) scheme for a function family allows clients to share their data among servers and then distribute the computation of any function to the servers …
In this paper, we explore the multi-server (ie, multiple servers are employed to perform computations) and multi-client (ie, multiple clients outsource joint computations on their joint …
G Tsaloli, A Mitrokotsa - International Conference on Information Security …, 2019 - Springer
In many situations, clients (eg, researchers, companies, hospitals) need to outsource joint computations based on joint inputs to external cloud servers in order to provide useful …
Homomorphic secret sharing (HSS) allows n clients to secret-share data to m servers, who can then homomorphically evaluate public functions over the shares. A natural application is …
Abstract An (n, m, t)-homomorphic secret sharing (HSS) scheme allows n clients to share their inputs across m servers, such that the inputs are hidden from any t colluding servers …
LF Zhang, R Safavi-Naini - … Symposium on Research in Computer Security, 2015 - Springer
Secure outsourcing of computation to cloud servers has attracted much attention in recent years. In a typical outsourcing scenario, the client stores its data on a cloud server and later …
E Zhang, J Peng, M Li - IET Information Security, 2018 - Wiley Online Library
Secret sharing is an important component of cryptography protocols and has a wide range of practical applications. However, the existing secret sharing schemes cannot apply to …
Often clients (eg, sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on …