scientific article

From MaRDI portal
Publication:2778845

zbMath0981.94042MaRDI QIDQ2778845

Bill Aiello, Yuval Ishai, Omer Reingold

Publication date: 21 March 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450119

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient set intersection with simulation-based securityThree-round secure multiparty computation from black-box two-round oblivious transferQuadratic secret sharing and conditional disclosure of secretsSelling multiple secrets to a single buyerOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateUC Updatable Databases and ApplicationsTwo-message statistically sender-private OT from LWEMeasuring, simulating and exploiting the head concavity phenomenon in BKZ3-Message Zero Knowledge Against Human IgnoranceSomewhere statistically binding commitment schemes with applicationsFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsAsymptotically quasi-optimal cryptographyA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementChannels of small log-ratio leakage and characterization of two-party differentially private computationUC priced oblivious transfer with purchase statistics and dynamic pricingOn the feasibility of extending oblivious transferActively secure arithmetic computation and VOLE with constant computational overheadAlgebraic restriction codes and their applicationsAdaptive Oblivious Transfer and GeneralizationOblivious Keyword Search with AuthorizationRound-optimal black-box secure computation from two-round malicious OTKnowledge encryption and its applications to simulatable protocols with low round-complexitySolutions to the anti-piracy problem in oblivious transferFully-Simulatable Oblivious Set TransferEfficient Traceable Oblivious Transfer and Its ApplicationsStatistically sender-private OT from LPN and derandomizationSmooth projective hashing and two-message oblivious transferGeneralized oblivious transfer by secret sharingA new framework for quantum oblivious transferRound-optimal black-box MPC in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingA framework for statistically sender private OT with optimal rateIndividual simulationsSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolImproved Garbled Circuit: Free XOR Gates and ApplicationsRate-1 quantum fully homomorphic encryptionAmortizing rate-1 OT and applications to PIR and PSICommunication-efficient distributed oblivious transferOptimal linear multiparty conditional disclosure of secrets protocolsEfficient oblivious transfers with access controlRestricted adaptive oblivious transferImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsSecure two-party computation in a quantum worldConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSCircuit-Private Multi-key FHEConcurrently Composable Security with Shielded Super-Polynomial SimulatorsSecurity against covert adversaries: Efficient protocols for realistic adversariesTowards Robust Computation on Encrypted DataUnnamed ItemEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesAlternative Protocols for Generalized Oblivious TransferThe communication complexity of private simultaneous messages, revisitedEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesPlacing conditional disclosure of secrets in the communication complexity universeOblivious signature-based envelopeEfficient Fully-Simulatable Oblivious TransferCommunication-Efficient Private Protocols for Longest Common SubsequenceAdaptive oblivious transfer with access control from lattice assumptionsAccelerating Oblivious Transfer with Batch Multi-exponentiationStatistical Zaps and new oblivious transfer protocolsAnother Look at Extended Private Information Retrieval ProtocolsUniversally Composable Adaptive Priced Oblivious TransferOn the Existence of Extractable One-Way FunctionsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensOblivious Transfer Based on the McEliece AssumptionsFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsEfficient oblivious evaluation protocol and conditional disclosure of secrets for DFAAn efficient protocol for secure two-party computation in the presence of malicious adversariesWeak Zero-Knowledge beyond the Black-Box BarrierTwo-round oblivious transfer from CDH or LPN