scispace - formally typeset
C

Chen Yuan

Researcher at Centrum Wiskunde & Informatica

Publications -  65
Citations -  573

Chen Yuan is an academic researcher from Centrum Wiskunde & Informatica. The author has contributed to research in topics: List decoding & Computer science. The author has an hindex of 10, co-authored 56 publications receiving 397 citations. Previous affiliations of Chen Yuan include Nanyang Technological University & University at Buffalo.

Papers
More filters
Journal ArticleDOI

Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes

TL;DR: In this paper, the authors constructed a class of optimal locally repairable codes of distances 3 and 4 with unbounded length (i.e., length of the codes is independent of the code alphabet size).
Journal ArticleDOI

How Long Can Optimal Locally Repairable Codes Be

TL;DR: In this article, it was shown that the code length of an optimal locally repairable code (LRC) over an alphabet of size $ {q}$ must be at most roughly $ {O({dq}}^{{3}}{)}$.
Book ChapterDOI

Amortized complexity of information-theoretically secure MPC revisited

TL;DR: In this paper, a packed version of Shamir's secret sharing scheme with active security was proposed. But this scheme is not suitable for general n-player MPC, since the adversary threshold t < n/3 and the communication complexity of the adversary is amortized.
Posted Content

How long can optimal locally repairable codes be

TL;DR: In this article, it was shown that the code length of an optimal locally repairable code (LRC) over an alphabet of size $q$ must be at most roughly O(d q^3) for distance ≥ 5.
Book ChapterDOI

Efficient Information-Theoretic Secure Multiparty Computation over \(\mathbb {Z}/p^k\mathbb {Z}\) via Galois Rings

TL;DR: This paper presents an efficient protocol for robust Secure Multiparty Computation over \(\mathbb {Z}/p^{k}\mathbb{Z}\) (for any prime p and positive integer k) that is perfectly secure against active adversaries corrupting a fraction of at most 1/3 players, and a robust protocol that is statistically secure against an active adversary corrupting at least 1/2 players.