scientific article

From MaRDI portal
Publication:2768332

zbMath0991.94045MaRDI QIDQ2768332

Moni Naor, Benny Pinkas

Publication date: 1 September 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (89)

Efficient set intersection with simulation-based securityAn Efficient Protocol for Oblivious DFA Evaluation and ApplicationsThree-round secure multiparty computation from black-box two-round oblivious transferTwo-round adaptively secure multiparty computation from standard assumptionsTwo-message statistically sender-private OT from LWE3-Message Zero Knowledge Against Human IgnoranceStandard Security Does Not Imply Indistinguishability Under Selective OpeningPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsAn improved affine equivalence algorithm for random permutationsAsymptotically quasi-optimal cryptographyA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementChannels of small log-ratio leakage and characterization of two-party differentially private computationMore efficient oblivious transfer extensionsRandomized quantum oblivious transfer with application in hacker-resistant computationThe Simplest Protocol for Oblivious TransferHow to simulate it in Isabelle: towards formal proof for secure multi-party computationActively secure arithmetic computation and VOLE with constant computational overheadAlgebraic restriction codes and their applicationsAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective HashingConstrained pseudorandom functions from homomorphic secret sharingAlmost-optimally fair multiparty coin-tossing with nearly three-quarters maliciousStatistical security in two-party computation revisitedRound-optimal black-box secure computation from two-round malicious OTClassically verifiable NIZK for QMA with preprocessingKnowledge encryption and its applications to simulatable protocols with low round-complexityReverse firewalls for oblivious transfer extension and applications to zero-knowledgeEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costTwo-round adaptively secure MPC from isogenies, LPN, or CDHBatching base oblivious transfersFaster Privacy-Preserving Location Proximity SchemesStatistically sender-private OT from LPN and derandomizationSmooth projective hashing and two-message oblivious transferA new framework for quantum oblivious transferRound-optimal black-box MPC in the plain modelReusable secure computation in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingA framework for statistically sender private OT with optimal rateSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersCryptographic group actions and applicationsAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolImproved Garbled Circuit: Free XOR Gates and ApplicationsRate-1 quantum fully homomorphic encryptionFlexible quantum oblivious transferOblivious transfer from trapdoor permutations in minimal roundsAmortizing rate-1 OT and applications to PIR and PSICommunication-efficient distributed oblivious transferImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesBlind Identity-Based Encryption and Simulatable Oblivious TransferSecure two-party computation in a quantum worldEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSImproved Private Set Intersection Against Malicious AdversariesWhat security can we achieve within 4 rounds?Oblivious DFA evaluation on joint input and its applicationsEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesCryptography and Game Theory: Designing Protocols for Exchanging InformationGeneric Construction of UC-Secure Oblivious TransferIndistinguishability Obfuscation: From Approximate to ExactEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesEfficient Fully-Simulatable Oblivious TransferAdaptive oblivious transfer with access control from lattice assumptionsPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningAccelerating Oblivious Transfer with Batch Multi-exponentiationStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsWitness indistinguishability for any single-round argument with applications to access controlNon-interactive zero knowledge from sub-exponential DDHCompact, efficient and UC-secure isogeny-based oblivious transferRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsRobust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystemWeak Oblivious Transfer from Strong One-Way FunctionsBETA: biometric-enabled threshold authenticationWhat Security Can We Achieve Within 4 Rounds?Network Oblivious TransferOn the Existence of Extractable One-Way FunctionsSpooky Encryption and Its ApplicationsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesOblivious keyword searchTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensOblivious Transfer Based on the McEliece AssumptionsSecure linear system computation in the presence of malicious adversariesSecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient UpdatesFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsAn efficient protocol for secure two-party computation in the presence of malicious adversariesWeak Zero-Knowledge beyond the Black-Box BarrierSuccinct non-interactive secure computationPSI from PaXoS: fast, malicious private set intersectionTwo-round oblivious transfer from CDH or LPN




This page was built for publication: