2016
DOI: 10.17512/jamcm.2016.1.04
|View full text |Cite
|
Sign up to set email alerts
|

Selected application of the Chinese Remainder Theorem in multiparty computation

Abstract: Abstract. In this paper we present protocols checking the equality of two distributed numbers and calculation of the product in such a way that the distributed numbers are unknown to anyone. The presented protocols use the Chinese Remainder Theorem. As a result, the obtained protocols have many interesting cryptographic features.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…k are calculated in accordance with (13) and (14), respectively. The proof of this theorem follows directly from Equations (7)- (14).…”
Section: Rank Calculation In Minimally Redundant Rnsmentioning
confidence: 99%
See 1 more Smart Citation
“…k are calculated in accordance with (13) and (14), respectively. The proof of this theorem follows directly from Equations (7)- (14).…”
Section: Rank Calculation In Minimally Redundant Rnsmentioning
confidence: 99%
“…k are calculated in accordance with (13) and (14), respectively. The proof of this theorem follows directly from Equations (7)- (14). According to Theorem 2, the transition from non-redundant to minimally redundant residue coding allows replacing rank correction ∆ k (X) requiring time-consuming calculations by a trivially calculated two-value attribute δ k (X) ∈ {0, 1} in (3).…”
Section: Rank Calculation In Minimally Redundant Rnsmentioning
confidence: 99%