Asymptotically quasi-optimal cryptography
From MaRDI portal
Publication:2170004
DOI10.1007/978-3-031-06944-4_11zbMath1496.94039OpenAlexW4285301190MaRDI QIDQ2170004
Vinod Vaikuntanathan, Leo de Castro, Muthu Venkitasubramaniam, Carmit Hazay, Yuval Ishai
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_11
Related Items (2)
Sok: vector OLE-based zero-knowledge protocols ⋮ Oblivious transfer with constant computational overhead
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast cut-and-choose-based protocols for malicious and covert adversaries
- On linear-size pseudorandom generators and hardcore functions
- Amortized complexity of information-theoretically secure MPC revisited
- On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
- Optimization, approximation, and complexity classes
- Secure computation using leaky correlations (asymptotically optimal constructions)
- Two-message statistically sender-private OT from LWE
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs
- Quasi-optimal SNARGs via linear multi-prover interactive proofs
- A generic approach to constructing and proving verifiable random functions
- Two-message witness indistinguishability and secure computation in the plain model from new assumptions
- Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
- Secure computation with constant communication overhead using multiplication embeddings
- Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits
- Efficient pseudorandom correlation generators from ring-LPN
- A non-PCP approach to succinct quantum-safe zero-knowledge
- Efficient protocols for oblivious linear function evaluation from ring-LWE
- Subquadratic SNARGs in the random oracle model
- Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles
- Compressible FHE with applications to PIR
- Algebraic techniques for short(er) exact lattice-based zero-knowledge proofs
- Aurora: transparent succinct arguments for R1CS
- Trapdoor hash functions and their applications
- Reusable non-interactive secure computation
- Scalable zero knowledge with no trusted setup
- Libra: succinct zero-knowledge proofs with optimal prover computation
- Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers
- Sanitization of FHE Ciphertexts
- (Leveled) fully homomorphic encryption without bootstrapping
- FHE Circuit Privacy Almost for Free
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Fully Homomorphic Encryption with Polylog Overhead
- Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
- Semi-homomorphic Encryption and Multiparty Computation
- Short Pairing-Based Non-interactive Zero-Knowledge Arguments
- Candidate One-Way Functions Based on Expander Graphs
- Interactive Oracle Proofs
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
- On Ideal Lattices and Learning with Errors over Rings
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- Zero-Knowledge Proofs from Secure Multiparty Computation
- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
- Generalized Compact Knapsacks Are Collision Resistant
- Oblivious Transfer Is Symmetric
- A Framework for Efficient and Composable Oblivious Transfer
- Founding Cryptography on Oblivious Transfer – Efficiently
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Short PCPs with Polylog Query Complexity
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Foundations of Cryptography
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- Succinct Non-interactive Arguments via Linear Interactive Proofs
- A Toolkit for Ring-LWE Cryptography
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
- Extracting Correlations
- Fully homomorphic encryption using ideal lattices
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
- Constant-Rate Oblivious Transfer from Noisy Channels
- Circuits resilient to additive attacks with applications to secure computation
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- On the concrete efficiency of probabilistically-checkable proofs
- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs
- Theory of Cryptography
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Asymptotically quasi-optimal cryptography