Correcting errors without leaking partial information

From MaRDI portal
Revision as of 02:51, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3581456

DOI10.1145/1060590.1060688zbMath1192.94118OpenAlexW2170255835MaRDI QIDQ3581456

No author found.

Publication date: 16 August 2010

Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1060590.1060688




Related Items (29)

Secure computation using leaky correlations (asymptotically optimal constructions)Two-way unclonable encryption with a vulnerable senderObfuscated fuzzy Hamming distance and conjunctions from subset product problemsInstantiability of RSA-OAEP under chosen-plaintext attackIndistinguishable Proofs of Work or KnowledgeComputational fuzzy extractor from LWELockable obfuscation from circularly insecure fully homomorphic encryptionLong term confidentiality: a surveySecurely obfuscating re-encryptionSecure identification and QKD in the bounded-quantum-storage modelVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESOptimal attacks on qubit-based quantum key recyclingObfuscating conjunctionsDeterministic public-key encryption for adaptively-chosen plaintext distributionsObfuscation for cryptographic purposesOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerA unified approach to deterministic encryption: new constructions and a connection to computational entropyOn best-possible obfuscationOn strong simulation and composable point obfuscationNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesDeterministic Public-Key Encryption Under Continual LeakageBetter short-seed quantum-proof extractorsLeakage resilience from program obfuscationThe magic of ELFsThe Magic of ELFsObfuscation of Hyperplane MembershipQuantum Authentication and Encryption with Key RecyclingQuantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)




This page was built for publication: Correcting errors without leaking partial information