Polynomial expressions of p-ary auction functions

One of the common ways to design secure multi-party computation is twofold: to realize secure fundamental operations and to decompose a target function to be securely computed into them. In the setting of fully homomorphic encryption, as well as some kinds of secret sharing, the fundamental operatio...

Full description

Bibliographic Details
Main Authors: Kaji Shizuo, Maeno Toshiaki, Nuida Koji, Numata Yasuhide
Format: Article
Language:English
Published: De Gruyter 2019-06-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2018-0016

Similar Items