Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
From MaRDI portal
Publication:2128558
DOI10.1007/978-3-030-84245-1_5zbMATH Open1486.94074OpenAlexW3189172804MaRDI QIDQ2128558FDOQ2128558
Authors: Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84245-1_5
Recommendations
Cites Work
- Generalized privacy amplification
- The random oracle methodology, revisited.
- Privacy Amplification by Public Discussion
- Title not available (Why is that?)
- Title not available (Why is that?)
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- A minimal model for secure computation (extended abstract)
- The Wire-Tap Channel
- Computationally Sound Proofs
- Families of Non-disjoint subsets
- On Best-Possible Obfuscation
- On the (im)possibility of obfuscating programs
- Founding Cryptography on Tamper-Proof Hardware Tokens
- On Efficient Zero-Knowledge PCPs
- Interactive PCP
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Return of GGH15: provable security against zeroizing attacks
- Secret-sharing for NP
- Bootstrapping Obfuscators via Fast Pseudorandom Functions
- Secure Obfuscation in a Weak Multilinear Map Model
- One-Time Programs
- Oblivious Transfer from Weak Noisy Channels
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Zero knowledge protocols from succinct constraint detection
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- Candidate iO from homomorphic encryption schemes
- Candidate obfuscation via oblivious LWE sampling
- Title not available (Why is that?)
- Title not available (Why is that?)
- Security in Communication Networks
- Physical-layer security. From information theory to security engineering
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Cryptography from one-way communication: on completeness of finite channels
- On the efficiency of bit commitment reductions
- Cryptography with One-Way Communication
- Interactive locking, zero-knowledge PCPs, and unconditional cryptography
- Languages with efficient zero-knowledge PCPs are in SZK
- Constant-rate oblivious transfer from noisy channels
- Cryptography and Coding
- Indistinguishability obfuscation from well-founded assumptions
- Indistinguishability obfuscation from circular security
Cited In (9)
- Computational wiretap coding from indistinguishability obfuscation
- The pseudorandom oracle model and ideal obfuscation
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Communication complexity of secure distributed computation in the presence of noise
- One-message secure reductions: on the cost of converting correlations
- Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)
- Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation
- Secure non-interactive reduction and spectral analysis of correlations
- Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
This page was built for publication: Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2128558)