Efficient Two-Party Exponentiation from Quotient Transfer

Y Lu, K Hara, K Ohara, J Schuldt, K Tanaka - International Conference on …, 2022 - Springer
Secure multi-party computation (MPC) allows participating parties to jointly compute a
function over their inputs while keeping them private. In particular, MPC based on additive …

Replicated Additive Secret Sharing with the Optimized Number of Shares

J Guo, M Shuai, Q Wang, W Li, J Lin - International Conference on Security …, 2022 - Springer
Replicated additive secret sharing (RSS) schemes introduce the threshold for additive secret
sharing, and are known for computational efficiency and flexibility. While the traditional RSS …

High-throughput secure multiparty multiplication protocol via bipartite graph partitioning

Y Xu, C Peng, W Tan, Y Tian, M Ma, H Ding - Peer-to-Peer Networking and …, 2021 - Springer
For the privacy-preserving computation of multi-source large scale data sets, the secure
multi-party computation protocol with high-throughput is of the utmost importance. However …

A Covert Communication Method Combining Secret Sharing and Steganography

P Yan, K Wang, X Jia - 2022 IEEE 2nd International Conference …, 2022 - ieeexplore.ieee.org
In the distributed environment, when all parties carry out the cooperative computing, there
are problems of low scalability and privacy leakage. To solve the above problems, this paper …