Peng, Fan; Chen, Hao; Zhao, Chang-An Algebraic geometric secret sharing schemes over large fields are asymptotically threshold. (English) Zbl 1499.14047 Pac. J. Math. 319, No. 1, 213-232 (2022). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 14G50 14H05 14Q05 94A60 94B27 PDF BibTeX XML Cite \textit{F. Peng} et al., Pac. J. Math. 319, No. 1, 213--232 (2022; Zbl 1499.14047) Full Text: DOI arXiv OpenURL
Maji, Hemanta K.; Nguyen, Hai H.; Paskin-Cherniavsky, Anat; Suad, Tom; Wang, Mingyuan Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages. (English) Zbl 1479.94336 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 344-374 (2021). MSC: 94A62 94A60 94B05 PDF BibTeX XML Cite \textit{H. K. Maji} et al., Lect. Notes Comput. Sci. 12697, 344--374 (2021; Zbl 1479.94336) Full Text: DOI OpenURL
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. High-performance multi-party computation for binary circuits based on oblivious transfer. (English) Zbl 1470.94080 J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. S. Burra} et al., J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021; Zbl 1470.94080) Full Text: DOI Link OpenURL
Narayanan, Varun; Prabahakaran, Vinod M. Oblivious transfer in incomplete networks. (English) Zbl 1443.94075 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 389-418 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Narayanan} and \textit{V. M. Prabahakaran}, Lect. Notes Comput. Sci. 11239, 389--418 (2018; Zbl 1443.94075) Full Text: DOI OpenURL
Block, Alexander R.; Gupta, Divya; Maji, Hemanta K.; Nguyen, Hai H. Secure computation using leaky correlations (asymptotically optimal constructions). (English) Zbl 1430.94058 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 36-65 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. R. Block} et al., Lect. Notes Comput. Sci. 11240, 36--65 (2018; Zbl 1430.94058) Full Text: DOI OpenURL
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael More efficient oblivious transfer extensions. (English) Zbl 1377.94030 J. Cryptology 30, No. 3, 805-858 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Asharov} et al., J. Cryptology 30, No. 3, 805--858 (2017; Zbl 1377.94030) Full Text: DOI Link OpenURL
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan On the power of secure two-party computation. (English) Zbl 1372.94429 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 397-429 (2016). MSC: 94A60 68P25 68M12 PDF BibTeX XML Cite \textit{C. Hazay} and \textit{M. Venkitasubramaniam}, Lect. Notes Comput. Sci. 9815, 397--429 (2016; Zbl 1372.94429) Full Text: DOI OpenURL
Kumaresan, Ranjit; Raghuraman, Srinivasan; Sealfon, Adam Network oblivious transfer. (English) Zbl 1391.94772 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 366-396 (2016). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{R. Kumaresan} et al., Lect. Notes Comput. Sci. 9815, 366--396 (2016; Zbl 1391.94772) Full Text: DOI OpenURL
Cascudo, Ignacio Secret sharing schemes with algebraic properties and applications. (English) Zbl 1479.94301 Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 68-77 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{I. Cascudo}, Lect. Notes Comput. Sci. 9709, 68--77 (2016; Zbl 1479.94301) Full Text: DOI OpenURL
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto On the complexity of additively homomorphic UC commitments. (English) Zbl 1388.94055 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 542-565 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{T. K. Frederiksen} et al., Lect. Notes Comput. Sci. 9562, 542--565 (2016; Zbl 1388.94055) Full Text: DOI OpenURL
Gupta, Divya; Ishai, Yuval; Maji, Hemanta K.; Sahai, Amit Secure computation from leaky correlated randomness. (English) Zbl 1352.94038 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015). MSC: 94A60 68Q87 PDF BibTeX XML Cite \textit{D. Gupta} et al., Lect. Notes Comput. Sci. 9216, 701--720 (2015; Zbl 1352.94038) Full Text: DOI OpenURL
Barkol, Omer; Ishai, Yuval; Weinreb, Enav On \(d\)-multiplicative secret sharing. (English) Zbl 1201.94074 J. Cryptology 23, No. 4, 580-593 (2010). MSC: 94A62 PDF BibTeX XML Cite \textit{O. Barkol} et al., J. Cryptology 23, No. 4, 580--593 (2010; Zbl 1201.94074) Full Text: DOI OpenURL