Secure multiparty computation in the bounded storage model
From MaRDI portal
Publication:2149802
DOI10.1007/978-3-030-92641-0_14zbMATH Open1490.68070OpenAlexW3203243761MaRDI QIDQ2149802FDOQ2149802
Satyanarayana Vusirikala, Jiahui Liu
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92641-0_14
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Founding Cryptography on Oblivious Transfer – Efficiently
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Tight security proofs for the bounded-storage model
- Everlasting security in the bounded storage model
- On Everlasting Security in the Hybrid Bounded Storage Model
- Non-interactive timestamping in the bounded-storage model
- Simple schemes in the bounded storage model
- Fast Learning Requires Good Memory
- Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction
- Commitment and Oblivious Transfer in the Bounded Storage Model With Errors
- Time-space hardness of learning sparse parities
Cited In (8)
- Speak much, remember little: cryptography in the bounded storage model, revisited
- A Probabilistic Small Model Theorem to Assess Confidentiality of Dispersed Cloud Storage
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Secure \(k\)-skyband computation framework in distributed multi-party databases
- Memory-sample lower bounds for learning with classical-quantum hybrid memory
- Disappearing cryptography in the bounded storage model
- Title not available (Why is that?)
This page was built for publication: Secure multiparty computation in the bounded storage model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149802)