2018
DOI: 10.1007/978-3-030-03332-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Secret Sharing for Low Degree Polynomials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…In this section, we implemented our scheme and got the running time of our scheme, and compared our scheme with the LMS scheme [21] in terms of efficiency.…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we implemented our scheme and got the running time of our scheme, and compared our scheme with the LMS scheme [21] in terms of efficiency.…”
Section: Performance Analysismentioning
confidence: 99%
“…We compare the efficiency of the scheme 2SVHSS with the LMS scheme [21] which supports polynomials of highest degree among all existing works, when the same number of servers are used. Because LMS is based on the k-HE assumption, we choose the homomorphic encryption scheme SH [10] to implement LMS.…”
Section: Comparisons With Lms [21]mentioning
confidence: 99%
See 2 more Smart Citations
“…The communication complexity of an FSS scheme refers to the total amount of information that needs to be transmitted to complete this FSS scheme. This criterion captures the performance of FSS with respect to its applications to PIR and related scenarios such as homomorphic secret sharing [10]- [13] and fully homomorphic encryption [14], [15]. Most known constructions continued the pursuit of minimising the communication complexity within the computational security setting.…”
Section: Introductionmentioning
confidence: 99%