Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134024
|View full text |Cite
|
Sign up to set email alerts
|

TinyOLE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 32 publications
(3 citation statements)
references
References 12 publications
0
0
0
Order By: Relevance
“…4. Lastly, unlike the TinyOLE scheme [7], our scheme is scalable, in that it extends to the multi-party case with n participants. In fact, computing n shares (one for each participant) to a single multiplication requires only n − 1 OLEs, one for each individual participant to compute his share.…”
Section: Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…4. Lastly, unlike the TinyOLE scheme [7], our scheme is scalable, in that it extends to the multi-party case with n participants. In fact, computing n shares (one for each participant) to a single multiplication requires only n − 1 OLEs, one for each individual participant to compute his share.…”
Section: Our Contributionmentioning
confidence: 99%
“…It suffices to assume that participants gain the shares of the triples via an external party known as an initialiser, who (after computing and distributing the shares of the triples) does not take part in the actual MPC protocol. In the next section we review the OLE based two-party protocol given by Döttling et al [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation