Verifiably multiplicative secret sharing

M Yoshida, S Obana - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
A d-multiplicative secret sharing (d-MSS) scheme allows the players to multiply d shared
secrets without recovering the secrets by converting their shares locally into an additive sharing …

Compact verifiably multiplicative secret sharing

M Yoshida, S Obana - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
A d-multiplicative secret sharing (d-MSS) scheme over a finite field allows the players to multiply
d shared secrets without recovering the secrets by converting their shares locally into an …

Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures

R Eriguchi, N Kunihiro, K Nuida - Designs, Codes and Cryptography, 2023 - Springer
… In this paper, we focus on multipartite adversary structures and propose efficient
multiplicative and verifiably multiplicative secret sharing schemes tailored to them. First, our …

Verifiable homomorphic secret sharing

G Tsaloli, B Liang, A Mitrokotsa - International Conference on Provable …, 2018 - Springer
In this paper, we explore the multi-server (ie, multiple servers are employed to perform
computations) and multi-client (ie, multiple clients outsource joint computations on their joint inputs…

Flaws in a verifiably multiplicative secret sharing scheme from ICITS 2017

M Yoshida, S Obana - Cryptology ePrint Archive, 2018 - eprint.iacr.org
… In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS)
scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at …

Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation

X Chen, LF Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
There are two main security concerns in outsourcing computations. One is how to protect
the privacy of the outsourced data, and the other is how to ensure the correctness of the …

Verifiable homomorphic secret sharing for low degree polynomials

X Chen, LF Zhang, J Liu - IEEE Transactions on Dependable …, 2022 - ieeexplore.ieee.org
An $(n,m,t)$ -homomorphic secret sharing (HSS) scheme for a function family $\mathcal F$
allows $n$ clients to share their data $x_{1}, \ldots,x_{n}$ among $m$ servers and then …

Verifiably Distributed Multi-User Secret Sharing schemes

L Lu, J Lu - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Distributed secret sharing techniques, where a specific secret is encoded into its shares which
are conveyed to the IoT device or its user via storage nodes, are considered. A verifiably …

A Dynamic Proactive Secret Sharing Scheme for Quadratic Functions

H Chen, L Zhang - IEEE Access, 2024 - ieeexplore.ieee.org
Dynamic proactive secret sharing (DPSS) allows a client to share a secret $s$ among a
committee of $n$ participants and allows the committee to reshare the secret among a new …

Two-server verifiable homomorphic secret sharing for high-degree polynomials

X Chen, LF Zhang - … Security: 23rd International Conference, ISC 2020 …, 2020 - Springer
… Yoshida and Obana [30] constructed verifiably multiplicative secret sharing schemes that
enable the computation of polynomials over the shared data. However, the degrees of their …