Computationally private randomizing polynomials and their applications

From MaRDI portal
Publication:2458940

DOI10.1007/s00037-006-0211-8zbMath1143.94009OpenAlexW2138532540MaRDI QIDQ2458940

Benny Applebaum, Eyal Kushilevitz, Yuval Ishai

Publication date: 5 November 2007

Published in: Computational Complexity (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00037-006-0211-8




Related Items (44)

Perfect secure computation in two roundsRound optimal black-box ``commit-and-proveImpossibility of simulation secure functional encryption even with random oraclesStatistical Randomized Encodings: A Complexity Theoretic ViewSuccinct garbling schemes from functional encryption through a local simulation paradigmTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelGarbling XOR gates ``for free in the standard modelIndistinguishability Obfuscation from Compact Functional EncryptionVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)Cryptographic hardness of random local functions. SurveyIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsReusable Two-Round MPC from LPNFrom FE combiners to secure MPC and backOn \(d\)-multiplicative secret sharingLocally computable UOWHF with linear shrinkageEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysmrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulusTwo-round maliciously secure computation with super-polynomial simulationOn actively-secure elementary MPC reductionsHomomorphic secret sharing for low degree polynomialsFoundations of Homomorphic Secret SharingA Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision MedicinePerfect Secure Computation in Two RoundsBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsBetter Two-Round Adaptive Multi-party ComputationProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationOn the relationship between statistical zero-knowledge and statistical randomized encodingsSimple and generic constructions of succinct functional encryptionIndistinguishability Obfuscation: From Approximate to ExactOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesRound-optimal secure multi-party computationObfustopia built on secret-key functional encryptionKey-dependent message security: generic amplification and completenessMulti-party threshold private set intersection with sublinear communicationVerifiable Pattern Matching on Outsourced TextsAdaptively Secure Garbled Circuits from One-Way FunctionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsOn the Relationship Between Statistical Zero-Knowledge and Statistical Randomized EncodingsCryptography with constant input localityGarbled Circuits as Randomized Encodings of Functions: a Primer






This page was built for publication: Computationally private randomizing polynomials and their applications