Secure computation using leaky correlations (asymptotically optimal constructions) (Q1631316): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2899913052 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple Constructions of Almost k-wise Independent Random Variables / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random Cayley graphs and expanders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Garbled Circuits as Randomized Encodings of Functions: a Primer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure arithmetic computation with constant computational overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035736 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure computation using leaky correlations (asymptotically optimal constructions) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure computation based on leaky correlations: high resilience setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and composition of multiparty cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resource-efficient OT combiners with active security / rank
 
Normal rank
Property / cites work
 
Property / cites work: On multiplication in finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic complexities and algebraic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correcting errors without leaking partial information / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the asymptotic behaviour of some towers of function fields over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tiny families of functions with random properties: A quality-size trade-off for hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3952016 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Computation from Leaky Correlated Randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: OT-Combiners via Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Robust Combiners for Oblivious Transfer and Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737161 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extracting Correlations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Robust Combiners for Private Information Retrieval and Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robuster Combiners for Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small-Bias Probability Spaces: Efficient Constructions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally secure oblivious transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Approach to Practical Active-Secure Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4212172 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error-Tolerant Combiners for Oblivious Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3596012 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious Transfer Is Symmetric / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 14:02, 17 July 2024

scientific article
Language Label Description Also known as
English
Secure computation using leaky correlations (asymptotically optimal constructions)
scientific article

    Statements

    Secure computation using leaky correlations (asymptotically optimal constructions) (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 December 2018
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers