Correcting errors without leaking partial information
From MaRDI portal
Publication:3581456
DOI10.1145/1060590.1060688zbMath1192.94118OpenAlexW2170255835MaRDI QIDQ3581456
No author found.
Publication date: 16 August 2010
Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1060590.1060688
Related Items (29)
Secure computation using leaky correlations (asymptotically optimal constructions) ⋮ Two-way unclonable encryption with a vulnerable sender ⋮ Obfuscated fuzzy Hamming distance and conjunctions from subset product problems ⋮ Instantiability of RSA-OAEP under chosen-plaintext attack ⋮ Indistinguishable Proofs of Work or Knowledge ⋮ Computational fuzzy extractor from LWE ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Long term confidentiality: a survey ⋮ Securely obfuscating re-encryption ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Optimal attacks on qubit-based quantum key recycling ⋮ Obfuscating conjunctions ⋮ Deterministic public-key encryption for adaptively-chosen plaintext distributions ⋮ Obfuscation for cryptographic purposes ⋮ On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles ⋮ Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ On best-possible obfuscation ⋮ On strong simulation and composable point obfuscation ⋮ New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Better short-seed quantum-proof extractors ⋮ Leakage resilience from program obfuscation ⋮ The magic of ELFs ⋮ The Magic of ELFs ⋮ Obfuscation of Hyperplane Membership ⋮ Quantum Authentication and Encryption with Key Recycling ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)
This page was built for publication: Correcting errors without leaking partial information