Peng, Fan; Chen, Hao; Zhao, Chang-An Algebraic geometric secret sharing schemes over large fields are asymptotically threshold. (English) Zbl 1499.14047 Pac. J. Math. 319, No. 1, 213-232 (2022). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 14G50 14H05 14Q05 94A60 94B27 PDF BibTeX XML Cite \textit{F. Peng} et al., Pac. J. Math. 319, No. 1, 213--232 (2022; Zbl 1499.14047) Full Text: DOI arXiv OpenURL
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Nof, Ariel Secure multiparty computation with sublinear preprocessing. (English) Zbl 1496.94029 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 427-457 (2022). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 13275, 427--457 (2022; Zbl 1496.94029) Full Text: DOI OpenURL
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Nof, Ariel Sublinear GMW-style compiler for MPC with preprocessing. (English) Zbl 07511740 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 457-485 (2021). MSC: 68N20 94A60 PDF BibTeX XML Cite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 12826, 457--485 (2021; Zbl 07511740) Full Text: DOI OpenURL
Polychroniadou, Antigoni; Song, Yifan Constant-overhead unconditionally secure multiparty computation over binary fields. (English) Zbl 07440628 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 812-841 (2021). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{A. Polychroniadou} and \textit{Y. Song}, Lect. Notes Comput. Sci. 12697, 812--841 (2021; Zbl 07440628) Full Text: DOI OpenURL
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. High-performance multi-party computation for binary circuits based on oblivious transfer. (English) Zbl 1470.94080 J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. S. Burra} et al., J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021; Zbl 1470.94080) Full Text: DOI Link OpenURL
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo Low cost constant round MPC combining BMR and oblivious transfer. (English) Zbl 1453.94085 J. Cryptology 33, No. 4, 1732-1786 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Hazay} et al., J. Cryptology 33, No. 4, 1732--1786 (2020; Zbl 1453.94085) Full Text: DOI Link OpenURL
García-Marco, Ignacio; Márquez-Corbella, Irene; Ruano, Diego High dimensional affine codes whose square has a designed minimum distance. (English) Zbl 1453.94142 Des. Codes Cryptography 88, No. 8, 1653-1672 (2020). Reviewer: Fernando Hernando (Castellón) MSC: 94B05 94B65 94A60 PDF BibTeX XML Cite \textit{I. García-Marco} et al., Des. Codes Cryptography 88, No. 8, 1653--1672 (2020; Zbl 1453.94142) Full Text: DOI arXiv OpenURL
Cascudo, Ignacio; Gundersen, Jaron Skovsted; Ruano, Diego Squares of matrix-product codes. (English) Zbl 1452.94111 Finite Fields Appl. 62, Article ID 101606, 21 p. (2020). Reviewer: Fernando Hernando (Castellón) MSC: 94B05 94A62 11T71 PDF BibTeX XML Cite \textit{I. Cascudo} et al., Finite Fields Appl. 62, Article ID 101606, 21 p. (2020; Zbl 1452.94111) Full Text: DOI arXiv OpenURL
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael More efficient oblivious transfer extensions. (English) Zbl 1377.94030 J. Cryptology 30, No. 3, 805-858 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Asharov} et al., J. Cryptology 30, No. 3, 805--858 (2017; Zbl 1377.94030) Full Text: DOI Link OpenURL
Ananth, Prabhanjan; Jain, Aayush; Sahai, Amit Robust transforming combiners from indistinguishability obfuscation to functional encryption. (English) Zbl 1410.94039 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 91-121 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 10210, 91--121 (2017; Zbl 1410.94039) Full Text: DOI OpenURL
Nielsen, Jesper Buus; Ranellucci, Samuel On the computational overhead of MPC with dishonest majority. (English) Zbl 1400.94167 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 369-395 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{J. B. Nielsen} and \textit{S. Ranellucci}, Lect. Notes Comput. Sci. 10175, 369--395 (2017; Zbl 1400.94167) Full Text: DOI Link OpenURL
Baum, Carsten; Orsini, Emmanuela; Scholl, Peter Efficient secure multiparty computation with identifiable abort. (English) Zbl 1406.94025 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 461-490 (2016). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{C. Baum} et al., Lect. Notes Comput. Sci. 9985, 461--490 (2016; Zbl 1406.94025) Full Text: DOI Link OpenURL
Couteau, Geoffroy; Peters, Thomas; Pointcheval, David Encryption switching protocols. (English) Zbl 1378.94033 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 308-338 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Couteau} et al., Lect. Notes Comput. Sci. 9814, 308--338 (2016; Zbl 1378.94033) Full Text: DOI OpenURL
Baum, Carsten; Damgård, Ivan; Toft, Tomas; Zakarias, Rasmus Better preprocessing for secure multiparty computation. (English) Zbl 1346.68085 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 327-345 (2016). MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{C. Baum} et al., Lect. Notes Comput. Sci. 9696, 327--345 (2016; Zbl 1346.68085) Full Text: DOI OpenURL
Cascudo, Ignacio Secret sharing schemes with algebraic properties and applications. (English) Zbl 1479.94301 Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 68-77 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{I. Cascudo}, Lect. Notes Comput. Sci. 9709, 68--77 (2016; Zbl 1479.94301) Full Text: DOI OpenURL
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny Efficient set intersection with simulation-based security. (English) Zbl 1351.94044 J. Cryptology 29, No. 1, 115-155 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. J. Freedman} et al., J. Cryptology 29, No. 1, 115--155 (2016; Zbl 1351.94044) Full Text: DOI OpenURL
Kiayias, Aggelos; Leonardos, Nikos; Lipmaa, Helger; Pavlyk, Kateryna; Tang, Qiang Communication optimal Tardos-based asymmetric fingerprinting. (English) Zbl 1382.94129 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 469-486 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Kiayias} et al., Lect. Notes Comput. Sci. 9048, 469--486 (2015; Zbl 1382.94129) Full Text: DOI OpenURL
Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat Secure computation with minimal interaction, revisited. (English) Zbl 1352.94075 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 359-378 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 9216, 359--378 (2015; Zbl 1352.94075) Full Text: DOI OpenURL