Secure linear system computation in the presence of malicious adversaries
From MaRDI portal
Publication:2335946
DOI10.1007/S11432-014-5160-2zbMath1426.15002OpenAlexW2046260703MaRDI QIDQ2335946
Publication date: 18 November 2019
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-014-5160-2
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Matrix multiplication via arithmetic progressions
- Secure two-party computation via cut-and-choose oblivious transfer
- Security and composition of multiparty cryptographic protocols
- Two-Output Secure Computation with Malicious Adversaries
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Secure Linear Algebra Using Linearly Recurrent Sequences
- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
- A Framework for Efficient and Composable Oblivious Transfer
- Secure Arithmetic Computation with No Honest Majority
- A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra
- Foundations of Cryptography
- Efficient Two-Party Secure Computation on Committed Inputs
- Theory of Cryptography
This page was built for publication: Secure linear system computation in the presence of malicious adversaries