Unbounded multi-party computation from learning with errors
From MaRDI portal
Publication:2056765
Cites work
- Bi-deniable public-key encryption
- Bonsai trees, or how to delegate a lattice basis
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- Efficient non-interactive secure computation
- Fuzzy Identity-Based Encryption
- How to Garble Arithmetic Circuits
- Leveled fully homomorphic signatures from standard lattices
- Multi-key fully-homomorphic encryption in the plain model
- Multiparty reusable non-interactive secure computation from LWE
- New constructions of reusable designated-verifier NIZKs
- Non-interactive secure computation based on cut-and-choose
- Non-interactive secure computation from one-way functions
- Public-key encryption schemes with auxiliary inputs
- Reusable garbled circuits and succinct functional encryption
- Reusable non-interactive secure computation
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Two round multiparty computation via multi-key FHE
- Two-message statistically sender-private OT from LWE
- Two-message witness indistinguishability and secure computation in the plain model from new assumptions
- Two-round multiparty secure computation from minimal assumptions
- Two-round secure MPC from indistinguishability obfuscation
- Witness encryption and its applications
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
Cited in
(7)
This page was built for publication: Unbounded multi-party computation from learning with errors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056765)