scientific article; zbMATH DE number 1304086

From MaRDI portal
Revision as of 16:22, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4250776

zbMath0932.68042MaRDI QIDQ4250776

Markus A. Stadler, Christian Cachin, Silvio Micali

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.





Related Items (68)

On the privacy of a code-based single-server computational PIR schemeSelling multiple secrets to a single buyerSQL on structurally-encrypted databasesTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timePrivacy-preserving inverse distance weighted interpolationZero-knowledge proofs for set membership: efficient, succinct, modularThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesSingle-server private information retrieval with sublinear amortized timeInstantiability of RSA-OAEP under chosen-plaintext attackFrom Identification to Signatures, Tightly: A Framework and Generic TransformsLocally verifiable signature and key aggregationSublinear secure computation from new assumptionsSuccinct NP Proofs from an Extractability AssumptionInner product functional commitments with constant-size public parameters and openingsOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingPrivacy-enhanced attribute-based private information retrievalUnnamed ItemA proposal for device independent probabilistic quantum oblivious transferThe hunting of the SNARKDividing secrets to secure data outsourcing\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHImproved and formal proposal for device-independent quantum private query *More constructions of lossy and correlation-secure trapdoor functionsIncrementally aggregatable vector commitments and applications to verifiable decentralized storageSimple and efficient two-server ORAMHomomorphic secret sharing for low degree polynomialsOn the tightness of forward-secure signature reductionsLossy Identification Schemes from Decisional RSAПротокол конфиденциального получения информацииImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionOptimal security proofs for full domain hash. RevisitedTighter Reductions for Forward-Secure Signature SchemesPipelined algorithms to detect cheating in long-term grid computationsAsymptotically Tight Bounds for Composing ORAM with PIRGeneral constructions for information-theoretic private information retrievalZero-knowledge proofs for set membership: efficient, succinct, modularOn the Validity of the Φ-Hiding Assumption in Cryptographic ProtocolsFast Private Norm Estimation and Heavy HittersA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn Basing Private Information Retrieval on NP-HardnessCryptographic Assumptions: A Position PaperSecure computation of the median (and other elements of specified ranks)Anonymous (hierarchical) identity-based encryption from broader assumptionsPractical Techniques Building on Encryption for Protecting and Managing Data in the CloudPrivate Information Retrieval with Preprocessing Based on the Approximate GCD ProblemLower-bounds on public-key operations in PIREfficient pre-processing PIR without public-key cryptographyFully malicious authenticated PIRPIR with client-side preprocessing: information-theoretic constructions and lower boundsHintless single-server private information retrievalPrivate multiparty sampling and approximation of vector combinationsMinicrypt primitives with algebraic structure and applicationsVerifiable single-server private information retrieval from LWE with binary errorsPublic Key Locally Decodable Codes with Short KeysPrivate information retrieval with sublinear online timeGeneral Construction of Chameleon All-But-One Trapdoor FunctionsMore efficient digital signatures with tight multi-user securitySpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsA Storage Efficient Redactable Signature in the Standard ModelOblivious keyword searchProtecting data privacy in private information retrieval schemesA Simpler Rate-Optimal CPIR ProtocolFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsPrivacy-Preserving Queries on Encrypted DataHomomorphic EncryptionSome Open Problems in Information-Theoretic Cryptography







This page was built for publication: