Breaking the Circuit Size Barrier for Secure Computation Under DDH (Q2835599): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4526995 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private information retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-identity and Multi-key Leveled FHE from Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Depth-Universal Circuit / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Spooky Encryption and Its Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: 3-query locally decodable codes of subexponential length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535073 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed Point Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bootstrapping for HElib / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evaluating Branching Programs on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Optimal Tardos-Based Asymmetric Fingerprinting / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Round Multiparty Computation via Multi-key FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication preserving protocols for secure function evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Number-theoretic constructions of efficient pseudo-random functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Searching on Streaming Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear-time encodable and decodable error-correcting codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal circuits (Preliminary Report) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549622 / rank
 
Normal rank

Latest revision as of 00:04, 13 July 2024

scientific article
Language Label Description Also known as
English
Breaking the Circuit Size Barrier for Secure Computation Under DDH
scientific article

    Statements

    Breaking the Circuit Size Barrier for Secure Computation Under DDH (English)
    0 references
    0 references
    0 references
    0 references
    30 November 2016
    0 references
    decisional Diffie-Hellman (DDH) assumption
    0 references
    2-out-of-2 secret sharing scheme
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers