Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Crypten: Secure multi-party computation meets machine learning

B Knott, S Venkataraman, A Hannun… - Advances in …, 2021 - proceedings.neurips.cc
Secure multi-party computation (MPC) allows parties to perform computations on data while
keeping that data private. This capability has great potential for machine-learning …

MP-SPDZ: A versatile framework for multi-party computation

M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …

High-throughput semi-honest secure three-party computation with an honest majority

T Araki, J Furukawa, Y Lindell, A Nof… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this paper, we describe a new information-theoretic protocol (and a computationally-
secure variant) for secure three-party computation with an honest majority. The protocol has …

Efficient pseudorandom correlation generators: Silent OT extension and more

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2019 - Springer
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …

Efficient circuit-based PSI with linear communication

B Pinkas, T Schneider, O Tkachenko… - Advances in Cryptology …, 2019 - Springer
We present a new protocol for computing a circuit which implements the private set
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …

FROST: flexible round-optimized Schnorr threshold signatures

C Komlo, I Goldberg - Selected Areas in Cryptography: 27th International …, 2021 - Springer
Unlike signatures in a single-party setting, threshold signatures require cooperation among
a threshold number of signers each holding a share of a common private key. Consequently …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …

Fast large-scale honest-majority MPC for malicious adversaries

K Chida, K Hamada, D Ikarashi, R Kikuchi… - Journal of …, 2023 - Springer
Protocols for secure multiparty computation enable a set of parties to compute a function of
their inputs without revealing anything but the output. The security properties of the protocol …

New primitives for actively-secure MPC over rings with applications to private machine learning

I Damgård, D Escudero, T Frederiksen… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
At CRYPTO 2018 Cramer et al. presented SPDZ2k, a new secret-sharing based protocol for
actively secure multi-party computation against a dishonest majority, that works over rings …