2018 International Conference on Communications (COMM) 2018
DOI: 10.1109/iccomm.2018.8484794
|View full text |Cite
|
Sign up to set email alerts
|

Round-Efficient Protocols for Secure Multiparty Fixed-Point Arithmetic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Notice that the SGD algorithm is not over integers, while Shamir's secret sharing is built over finite fields like Z p . Recall that [2] and [3] presents secure fixed-point addition, multiplication, truncation and less-then-zero (LTZ) protocol with respect to Shamir's scheme. Thus we adopt [2] and [3] to realize the secure addition and multiplication, which details are recalled in Sect.…”
Section: Building Blocks Of Our Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…Notice that the SGD algorithm is not over integers, while Shamir's secret sharing is built over finite fields like Z p . Recall that [2] and [3] presents secure fixed-point addition, multiplication, truncation and less-then-zero (LTZ) protocol with respect to Shamir's scheme. Thus we adopt [2] and [3] to realize the secure addition and multiplication, which details are recalled in Sect.…”
Section: Building Blocks Of Our Protocolmentioning
confidence: 99%
“…We now present a detailed overview of fixed-point calculations in [2] and [3], which also explains the notations to make it easier to read the following subsections. We will first introduce the representation of fixed-point numbers in Shamir's sharing and then recall the addition and multiplication with truncation, and finally introduce the less-than-zero protocol.…”
Section: Secure Fixed-point Calculation [2] and [3]mentioning
confidence: 99%
See 3 more Smart Citations