A survey on perfectly secure verifiable secret-sharing

A Chandramouli, A Choudhury, A Patra - ACM Computing Surveys …, 2022 - dl.acm.org
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It
is used as a building block in several distributed computing tasks, such as Byzantine …

Strong (n, t, n) verifiable secret sharing scheme

L Harn, C Lin - Information Sciences, 2010 - Elsevier
A (t, n) secret sharing divides a secret into n shares in such a way that any t or more than t
shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In …

Computational verifiable secret sharing revisited

M Backes, A Kate, A Patra - … 2011: 17th International Conference on the …, 2011 - Springer
Verifiable secret sharing (VSS) is an important primitive in distributed cryptography that
allows a dealer to share a secret among n parties in the presence of an adversary …

An efficient framework for unconditionally secure multiparty computation

A Choudhury, A Patra - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
parties to securely compute an agreed function f over some finite field in the presence of a
computationally unbounded adversary, who can maliciously corrupt any t out of the n …

On the exact round complexity of secure three-party computation

A Patra, D Ravi - Advances in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We settle the exact round complexity of three-party computation (3PC) in honest-majority
setting, for a range of security notions such as selective abort, unanimous abort, fairness and …

Secure computation with minimal interaction, revisited

Y Ishai, R Kumaresan, E Kushilevitz… - Advances in Cryptology …, 2015 - Springer
Motivated by the goal of improving the concrete efficiency of secure multiparty computation
(MPC), we revisit the question of MPC with only two rounds of interaction. We consider a …

Secure multiparty computation with minimal interaction

Y Ishai, E Kushilevitz, A Paskin - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We revisit the question of secure multiparty computation (MPC) with two rounds of
interaction. It was previously shown by Gennaro et al.(Crypto 2002) that 3 or more …

Perfect (parallel) broadcast in constant expected rounds via statistical VSS

G Asharov, A Chandramouli - … International Conference on the Theory and …, 2024 - Springer
We study broadcast protocols in the information-theoretic model under optimal conditions,
where the number of corruptions t is at most one-third of the parties, n. While worst-case Ω …

Efficient asynchronous verifiable secret sharing and multiparty computation

A Patra, A Choudhury, C Pandu Rangan - Journal of Cryptology, 2015 - Springer
Abstract Secure Multi-Party Computation (MPC) providing information-theoretic security
allows a set of n parties to securely compute an agreed function over a finite field, even if t …

Protecting data privacy and security for cloud computing based on secret sharing

CN Yang, JB Lai - 2013 International Symposium on Biometrics …, 2013 - ieeexplore.ieee.org
Cloud computing is an Internet-based computing. Computing services, such as data,
storage, software, computing, and application, are delivered to local devices through …