Multiparty reusable non-interactive secure computation from LWE
From MaRDI portal
Publication:2056764
Cites work
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 1775399 (Why is no real title available?)
- scientific article; zbMATH DE number 1405637 (Why is no real title available?)
- A minimal model for secure computation (extended abstract)
- Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
- Adaptively secure, universally composable, multiparty computation in constant rounds
- Advances in Cryptology - EUROCRYPT 2004
- Bonsai trees, or how to delegate a lattice basis
- Classical hardness of learning with errors
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- Efficient lattice (H)IBE in the standard model
- Efficient non-interactive secure computation
- Four round secure computation without setup
- From FE combiners to secure MPC and back
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Generating shorter bases for hard random lattices
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Key homomorphic PRFs and their applications
- Lattice-based FHE as secure as PKE
- Lattice-based fully dynamic multi-key FHE with short ciphertexts
- Leveled fully homomorphic signatures from standard lattices
- Mr NISC: multiparty reusable non-interactive secure computation
- Multi-identity and multi-key leveled FHE from learning with errors
- Multi-key FHE from LWE, revisited
- Multi-key fully-homomorphic encryption in the plain model
- Multiparty computation with low communication, computation and interaction via threshold FHE
- Multiparty reusable non-interactive secure computation from LWE
- New and improved key-homomorphic pseudorandom functions
- Non-interactive secure computation based on cut-and-choose
- Non-interactive secure computation from one-way functions
- Non-interactive secure multiparty computation
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- On lattices, learning with errors, random linear codes, and cryptography
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Pseudorandom functions and lattices
- Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions
- Public-key cryptosystems from the worst-case shortest vector problem
- Reusable non-interactive secure computation
- Reusable two-round MPC from DDH
- Round-optimal secure multiparty computation with honest majority
- Secure MPC: laziness leads to GOD
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Two round multiparty computation via multi-key FHE
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Two-message statistically sender-private OT from LWE
- Two-message witness indistinguishability and secure computation in the plain model from new assumptions
- Two-round MPC: information-theoretic and black-box
- Two-round multiparty secure computation from minimal assumptions
- Two-round multiparty secure computation minimizing public key operations
- Two-round secure MPC from indistinguishability obfuscation
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
Cited in
(16)- mrNISC from LWE with polynomial modulus
- Reusable non-interactive secure computation
- Reusable two-round MPC from LPN
- Parallelizable delegation from LWE
- Black-box reusable NISC with random oracles
- Simple threshold (fully homomorphic) encryption from LWE with polynomial modulus
- Secure quantum computation with classical communication
- Maliciously-secure MrNISC in the plain model
- Reusable secure computation in the plain model
- Witness encryption for succinct functional commitments and applications
- Multiparty reusable non-interactive secure computation from LWE
- Unbounded multi-party computation from learning with errors
- Malicious security for SCALES. Outsourced computation with ephemeral servers
- Two-round maliciously secure computation with super-polynomial simulation
- SCALES. MPC with small clients and larger ephemeral servers
- mrNISC from LWE with polynomial modulus
This page was built for publication: Multiparty reusable non-interactive secure computation from LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056764)