Secure Computation against Adaptive Auxiliary Information
From MaRDI portal
Publication:2845680
DOI10.1007/978-3-642-40041-4_18zbMath1310.94132OpenAlexW1606640167MaRDI QIDQ2845680
Sanjam Garg, Amit Sahai, Yael Tauman Kalai, Elette Boyle, Abhishek Jain
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_18
Related Items (10)
Memory leakage-resilient secret sharing schemes ⋮ Constant-round leakage-resilient zero-knowledge from collision resistance ⋮ Impossibility of Black-Box Simulation Against Leakage Attacks ⋮ Secure Computation from Leaky Correlated Randomness ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Leakage-resilient coin tossing ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model ⋮ Weak Zero-Knowledge beyond the Black-Box Barrier
This page was built for publication: Secure Computation against Adaptive Auxiliary Information