Ignacio Cascudo
YOU?
Author Swipe
View article: A note on secure multiparty computation via higher residue symbols
A note on secure multiparty computation via higher residue symbols Open
We generalize a protocol by Yu for comparing two integers with relatively small difference in a secure multiparty computation setting. Yu's protocol is based on the Legendre symbol. A prime number p is found for which the Legendre symbol (…
View article: Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Improved Bounds on the Threshold Gap in Ramp Secret Sharing Open
In this paper, we consider linear secret sharing schemes over a finite field F q , where the secret is a vector in Fℓ q and each of the n shares is a single element of F q . We obtain lower bounds on the so-called threshold gap g of such s…
View article: On Squares of Cyclic Codes
On Squares of Cyclic Codes Open
The square $C^{*2}$ of a linear error correcting code $C$ is the linear code\nspanned by the component-wise products of every pair of (non-necessarily\ndistinct) words in $C$. Squares of codes have gained attention for several\napplication…
View article: Improved Bounds on the Threshold Gap in Ramp Secret Sharing.
Improved Bounds on the Threshold Gap in Ramp Secret Sharing. Open
In this paper, we consider linear secret sharing schemes over a finite field F q , where the secret is a vector in Fℓ q and each of the n shares is a single element of F q . We obtain lower bounds on the so-called threshold gap g of such s…