Actively Secure Polynomial Evaluation from Shared Polynomial Encodings
Many of the currently best actively secure Multi-Party Computation (MPC) protocols like
SPDZ (Damgård et al., CRYPTO 2012) and improvements thereof use correlated …
SPDZ (Damgård et al., CRYPTO 2012) and improvements thereof use correlated …
Info-Commit: Information-Theoretic Polynomial Commitment
We introduce Info-Commit, an information-theoretic protocol for polynomial commitment and
verification. With the help of a trusted initializer, a succinct commitment to a private …
verification. With the help of a trusted initializer, a succinct commitment to a private …
Verifiable and private oblivious polynomial evaluation
It is a challenging problem to delegate the computation of a polynomial on encrypted data to
a server in an oblivious and verifiable way. In this paper, we formally define Verifiable and …
a server in an oblivious and verifiable way. In this paper, we formally define Verifiable and …
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service
Distributed oblivious polynomial evaluation (DOPE) is a special case of two-party
computation where the sender party P 1 holds a polynomial f (x) of degree k and the receiver …
computation where the sender party P 1 holds a polynomial f (x) of degree k and the receiver …
Arithmetic tuples for mpc
Some of the most efficient protocols for Multi-Party Computation (MPC) use a two-phase
approach where correlated randomness, in particular Beaver triples, is generated in the …
approach where correlated randomness, in particular Beaver triples, is generated in the …
An Efficient HPRA‐Based Multiclient Verifiable Computation: Transform and Instantiation
S Xu - Security and Communication Networks, 2021 - Wiley Online Library
Choi, Katz, Kumaresan, and Cid put forward the conception of multiclient noninteractive
verifiable computation (MVC), enabling a group of clients to outsource computation of a …
verifiable computation (MVC), enabling a group of clients to outsource computation of a …
Info-Commit: Information-Theoretic Polynomial Commitment
We introduce Info-Commit, an information-theoretic protocol for polynomial commitment and
verification. With the help of a trusted initializer, a succinct commitment to a private …
verification. With the help of a trusted initializer, a succinct commitment to a private …
An efficient and provably secure private polynomial evaluation scheme
Abstract Private Polynomial Evaluation (PPE) allows the service provider to outsource the
computation of a polynomial to some third party (eg the Cloud) in a verifiable way. And …
computation of a polynomial to some third party (eg the Cloud) in a verifiable way. And …
VESPo: Verified Evaluation of Secret Polynomials
Proofs of Retrievability are protocols which allow a Client to store data remotely and to
efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of …
efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of …
[PDF][PDF] Blockchain-powered healthcare insurance system
Security and privacy concerns of health records are challenging issues in modern
healthcare systems. Typically, in a healthcare system, doctor requires to confirm the …
healthcare systems. Typically, in a healthcare system, doctor requires to confirm the …