Asymptotically quasi-optimal cryptography (Q2170004): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: Libra / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: libiop / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Ligero / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: ring-LWE / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4285301190 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4638056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778845 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable zero knowledge with no trusted setup / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear-time zero-knowledge proofs for arithmetic circuit satisfiability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient pseudorandom correlation generators from ring-LPN / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the concrete efficiency of probabilistically-checkable proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct Non-interactive Arguments via Linear Interactive Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Aurora: transparent succinct arguments for R1CS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive Oracle Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-message statistically sender-private OT from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-homomorphic Encryption and Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient protocols for oblivious linear function evaluation from ring-LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-message witness indistinguishability and secure computation in the plain model from new assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure computation using leaky correlations (asymptotically optimal constructions) / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: On linear-size pseudorandom generators and hardcore functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exploring crypto dark matter: new simple PRF candidates and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quasi-optimal SNARGs via linear multi-prover interactive proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A non-PCP approach to succinct quantum-safe zero-knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic techniques for short(er) exact lattice-based zero-knowledge proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure computation with constant communication overhead using multiplication embeddings / rank
 
Normal rank
Property / cites work
 
Property / cites work: FHE Circuit Privacy Almost for Free / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short PCPs with Polylog Query Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Amortized complexity of information-theoretically secure MPC revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable non-interactive secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Subquadratic SNARGs in the random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318695 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoor hash functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sanitization of FHE Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quadratic Span Programs and Succinct NIZKs without PCPs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compressible FHE with applications to PIR / rank
 
Normal rank
Property / cites work
 
Property / cites work: A generic approach to constructing and proving verifiable random functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption with Polylog Overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuits resilient to additive attacks with applications to secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate One-Way Functions Based on Expander Graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short Pairing-Based Non-interactive Zero-Knowledge Arguments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lapin: An Efficient Authentication Protocol Based on Ring-LPN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Rate Oblivious Transfer from Noisy Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549593 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extracting Correlations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero-Knowledge Proofs from Secure Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistically Checkable Proofs of Proximity with Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast cut-and-choose-based protocols for malicious and covert adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized Compact Knapsacks Are Collision Resistant / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Toolkit for Ring-LWE Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2768332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimization, approximation, and complexity classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious Transfer Is Symmetric / rank
 
Normal rank
Property / cites work
 
Property / cites work: Libra: succinct zero-knowledge proofs with optimal prover computation / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 00:01, 30 July 2024

scientific article
Language Label Description Also known as
English
Asymptotically quasi-optimal cryptography
scientific article

    Statements

    Asymptotically quasi-optimal cryptography (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    30 August 2022
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers