Two-message witness indistinguishability and secure computation in the plain model from new assumptions

From MaRDI portal
Publication:1701448

DOI10.1007/978-3-319-70700-6_10zbMath1417.94040OpenAlexW2769708155MaRDI QIDQ1701448

Akshay Wadia, Saikrishna Badrinarayanan, Yuval Ishai, Sanjam Garg, Amit Sahai

Publication date: 23 February 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70700-6_10




Related Items

One-message zero knowledge and non-malleable commitmentsTwo-message statistically sender-private OT from LWEPattern matching on encrypted streamsAsymptotically quasi-optimal cryptographyCompressible FHE with applications to PIRAlgebraic restriction codes and their applicationsRound-optimal black-box secure computation from two-round malicious OTConcurrently composable non-interactive secure computationStatistically sender-private OT from LPN and derandomizationA new framework for quantum oblivious transferRound-optimal black-box MPC in the plain modelA framework for statistically sender private OT with optimal rateHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreIndividual simulationsSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersCryptographic group actions and applicationsSecure quantum computation with classical communicationBlack-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardnessStatistical ZAPs from group-based assumptionsTwo-round maliciously secure computation with super-polynomial simulationBlockchains enable non-interactive MPCAmortizing rate-1 OT and applications to PIR and PSINon-interactive secure computation from one-way functionsOffline witness encryption with semi-adaptive securityStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsWeak Zero-Knowledge beyond the Black-Box BarrierSuccinct non-interactive secure computationTwo-round oblivious transfer from CDH or LPN