Adaptively Secure Garbled Circuits from One-Way Functions

From MaRDI portal
Revision as of 19:56, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2829946

DOI10.1007/978-3-662-53015-3_6zbMath1406.94063OpenAlexW2396662730MaRDI QIDQ2829946

Brett Hemenway, Rafail Ostrovsky, Zahra Jafargholi, Daniel Wichs, Alessandra Scafuro

Publication date: 9 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_6



Related Items

Limits on the adaptive security of Yao's garbling, A simple construction of iO for Turing machines, Succinct garbling schemes from functional encryption through a local simulation paradigm, Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity, Adaptive Security of Yao’s Garbled Circuits, Delegating RAM Computations with Adaptive Soundness and Privacy, Adaptive Succinct Garbled RAM or: How to Delegate Your Database, From Cryptomania to Obfustopia Through Secret-Key Functional Encryption, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Adaptive security of practical garbling schemes, From cryptomania to obfustopia through secret-key functional encryption, From FE combiners to secure MPC and back, Adaptively secure garbling schemes for parallel computations, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, On the optimal succinctness and efficiency of functional encryption and attribute-based encryption, Tri-state circuits. A circuit model that captures RAM, Streaming functional encryption, Unclonable encryption, revisited, On treewidth, separators and Yao's garbling, The cost of adaptivity in security games on graphs, On the power of secure two-party computation, Combiners for functional encryption, unconditionally, Compact NIZKs from standard assumptions on bilinear maps, New constructions of statistical NIZKs: dual-mode DV-NIZKs and more, Threshold garbled circuits and ad hoc secure computation, On the Power of Secure Two-Party Computation, Adaptively Secure Garbled Circuits from One-Way Functions, Amplifying the security of functional encryption, unconditionally, Garbled Circuits as Randomized Encodings of Functions: a Primer, Depth-Robust Graphs and Their Cumulative Memory Complexity, Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model



Cites Work