Strong Hardness of Privacy from Weak Traitor Tracing (Q3179374): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2480325051 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1607.06141 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Learning and Sanitization: Pure vs. Approximate Differential Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Contention in Cryptoland: Obfuscation, Leakage and UCE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect Structure on the Edge of Chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: A learning theory approach to noninteractive database privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fingerprinting codes and the price of approximate differential privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940701 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the complexity of differentially private data release / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Iterative Constructions and Private Data Release / rank
 
Normal rank
Property / cites work
 
Property / cites work: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient noise-tolerant learning from statistical queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strong Hardness of Privacy from Weak Traitor Tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Differential Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Geometry of Differential Privacy: The Small Database and Approximate Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive privacy via the median mechanism / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Algorithms for Privately Releasing Marginals / rank
 
Normal rank
Property / cites work
 
Property / cites work: Answering n <sub>{2+o(1)}</sub> counting queries with differential privacy is hard / rank
 
Normal rank
Property / cites work
 
Property / cites work: PCPs and the Hardness of Generating Private Synthetic Data / rank
 
Normal rank

Latest revision as of 05:24, 13 July 2024

scientific article
Language Label Description Also known as
English
Strong Hardness of Privacy from Weak Traitor Tracing
scientific article

    Statements

    Strong Hardness of Privacy from Weak Traitor Tracing (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    21 December 2016
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references