Searched for: subject%3A%22Secret%255C%2Bsharing%22
(1 - 4 of 4)
document
Veugen, P.J.M. (author), Abspoel, M.A. (author)
We consider secure integer division within a secret-sharing based secure multi-party computation framework, where the dividend is secret-shared, but the divisor is privately known to a single party. We mention various applications where this situation arises. We give a solution within the passive security model, and extend this to the active...
conference paper 2021
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Veugen, P.J.M. (author)
In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...
article 2015
document
Erkin, Z. (author), Veugen, P.J.M. (author)
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and sim-plicity make our lives more complicated in terms of man-agement due to several issues like mismatching interfaces and complexity of the micro-management. One approach...
conference paper 2014
Searched for: subject%3A%22Secret%255C%2Bsharing%22
(1 - 4 of 4)