Is GMW different from Secret Sharing?Threshold Secret sharing - How to create a shared secret from pre...
What could cause an entire planet of humans to become aphasic?
Why don't you get burned by the wood benches in a sauna?
Does しかたない imply disappointment?
bash aliases do not expand even with shopt expand_aliases
Short story about a man betting a group he could tell a story, and one of them would disappear and the others would not notice
Is there any way to play D&D without a DM?
Is the tritone (A4 / d5) still banned in Roman Catholic music?
Proving the Borel-Cantelli Lemma
Sets which are both Sum-free and Product-free.
Can a Way of Shadow Monk use Shadow Step to teleport to a dark ceiling and then body slam another creature?
Is Screenshot Time-tracking Common?
Trying to make a 3dplot
Is there a configuration of the 8-puzzle where locking a tile makes it harder?
Is the percentage symbol a constant?
Will the duration of traveling to Ceres using the same tech developed for going to Mars be proportional to the distance to go to Mars or not?
Partial derivative with respect to three variables
How bad is a Computer Science course that doesn't teach Design Patterns?
Isn't a semicolon (';') needed after a function declaration in C++?
Is there any danger of my neighbor having my wife's signature?
I am a loser when it comes to jobs, what possibilities do I have?
What sort of grammatical construct is ‘Quod per sortem sternit fortem’?
Boss asked me to sign a resignation paper without a date on it along with my new contract
Why do single electrical receptacles exist?
Did ancient Germans take pride in leaving the land untouched?
Is GMW different from Secret Sharing?
Threshold Secret sharing - How to create a shared secret from pre existing secret parts?XOR secret sharing schemeSecure degree reduction for Shamir's secret sharingShamir's secret sharing scheme - type of channelsDifference between hierarchical and multi level secret sharingSome terms related to secret sharing: Optimality, What does it mean?Shamir's scheme secret sharingSecret sharing over reals - constructing a (k,n) threshold schemesecret sharing scheme differenceHow is Blakley's Secret Sharing Scheme perfect?
$begingroup$
Is GMW (How to play ANY mental game) protocol different from Secret Sharing??
If so, how is it different from Secret sharing?
secret-sharing
$endgroup$
add a comment |
$begingroup$
Is GMW (How to play ANY mental game) protocol different from Secret Sharing??
If so, how is it different from Secret sharing?
secret-sharing
$endgroup$
add a comment |
$begingroup$
Is GMW (How to play ANY mental game) protocol different from Secret Sharing??
If so, how is it different from Secret sharing?
secret-sharing
$endgroup$
Is GMW (How to play ANY mental game) protocol different from Secret Sharing??
If so, how is it different from Secret sharing?
secret-sharing
secret-sharing
edited 32 mins ago
kelalaka
8,01322350
8,01322350
asked 2 hours ago
malleamallea
503112
503112
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
$begingroup$
They are very different. GMW is a multi-party computation protocol while secret sharing is a technique to distribute a secret. GMW uses secret sharing as a building block but it also uses other primitives like an oblivious transfer (OT). GMW deals with the problem that multiple parties jointly compute a function (over their inputs) securely without revealing anything else except the final output value of the function. Note that a simple difference is that GMW does not have a particular secret distributor (well actually every party distributes secrets), as opposed to secret sharing.
$endgroup$
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
return StackExchange.using("mathjaxEditing", function () {
StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix) {
StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
});
});
}, "mathjax-editing");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "281"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67537%2fis-gmw-different-from-secret-sharing%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
$begingroup$
They are very different. GMW is a multi-party computation protocol while secret sharing is a technique to distribute a secret. GMW uses secret sharing as a building block but it also uses other primitives like an oblivious transfer (OT). GMW deals with the problem that multiple parties jointly compute a function (over their inputs) securely without revealing anything else except the final output value of the function. Note that a simple difference is that GMW does not have a particular secret distributor (well actually every party distributes secrets), as opposed to secret sharing.
$endgroup$
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
add a comment |
$begingroup$
They are very different. GMW is a multi-party computation protocol while secret sharing is a technique to distribute a secret. GMW uses secret sharing as a building block but it also uses other primitives like an oblivious transfer (OT). GMW deals with the problem that multiple parties jointly compute a function (over their inputs) securely without revealing anything else except the final output value of the function. Note that a simple difference is that GMW does not have a particular secret distributor (well actually every party distributes secrets), as opposed to secret sharing.
$endgroup$
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
add a comment |
$begingroup$
They are very different. GMW is a multi-party computation protocol while secret sharing is a technique to distribute a secret. GMW uses secret sharing as a building block but it also uses other primitives like an oblivious transfer (OT). GMW deals with the problem that multiple parties jointly compute a function (over their inputs) securely without revealing anything else except the final output value of the function. Note that a simple difference is that GMW does not have a particular secret distributor (well actually every party distributes secrets), as opposed to secret sharing.
$endgroup$
They are very different. GMW is a multi-party computation protocol while secret sharing is a technique to distribute a secret. GMW uses secret sharing as a building block but it also uses other primitives like an oblivious transfer (OT). GMW deals with the problem that multiple parties jointly compute a function (over their inputs) securely without revealing anything else except the final output value of the function. Note that a simple difference is that GMW does not have a particular secret distributor (well actually every party distributes secrets), as opposed to secret sharing.
answered 1 hour ago
Shan ChenShan Chen
1,645613
1,645613
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
add a comment |
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea I would say GMW is based on secret sharing but not solely on that. OT is also a very important component of GMW, which hides the intermediate values when computing the circuit/function.
$endgroup$
– Shan Chen
54 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
@mallea, well if Alice and Bob are "distributing shares" to each other, then I'd say it is definitely based on secret sharing. Note that there are 2-party computation protocols (and even >2 party computation protocols) that do not use secret sharing.
$endgroup$
– mikeazo
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
$begingroup$
Thank you very much!
$endgroup$
– mallea
53 mins ago
add a comment |
Thanks for contributing an answer to Cryptography Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
Use MathJax to format equations. MathJax reference.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67537%2fis-gmw-different-from-secret-sharing%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown