Spooky Encryption and Its Applications
From MaRDI portal
Publication:2829944
DOI10.1007/978-3-662-53015-3_4zbMATH Open1406.94045OpenAlexW2494395658MaRDI QIDQ2829944FDOQ2829944
Authors: Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
Publication date: 9 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_4
Recommendations
- Progress in Cryptology – Mycrypt 2005
- Homomorphic encryption and applications
- SCARE of secret ciphers with SPN structures
- scientific article; zbMATH DE number 1006115
- Witness encryption and its applications
- scientific article; zbMATH DE number 2009964
- Concealment and its applications to authenticated encryption
- Cryptography with chaos and shadowing
- New insights on AES-like SPN ciphers
- Cryptology: methods, applications and challenges
Cites Work
- \(i\)-hop homomorphic encryption and rerandomizable Yao circuits
- Public-key cryptosystems from the worst-case shortest vector problem
- The hardness of approximation: Gap location
- Efficient public-key cryptography in the presence of key leakage
- Efficient oblivious transfer protocols
- Classical hardness of learning with errors
- On lattices, learning with errors, random linear codes, and cryptography
- How to delegate computations
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Advances in Cryptology – CRYPTO 2004
- Bounded CCA2-Secure Encryption
- Obfuscation of probabilistic circuits and applications
- Title not available (Why is that?)
- Spooky Encryption and Its Applications
- Maliciously circuit-private FHE
- Function secret sharing
- Multi-key FHE from LWE, revisited
- Multi-identity and multi-key leveled FHE from learning with errors
- Two round multiparty computation via multi-key FHE
- Two-round secure MPC from indistinguishability obfuscation
- Distributed Point Functions and Their Applications
- Targeted malleability: homomorphic encryption for restricted computations
- Succinct arguments from multi-prover interactive proofs and their efficiency benefits
- Delegation for bounded space
Cited In (47)
- On homomorphic secret sharing from polynomial-modulus LWE
- Optimal single-server private information retrieval
- Delegation with updatable unambiguous proofs and PPAD-hardness
- Post-quantum multi-party computation
- Reusable two-round MPC from LPN
- Broadcast-optimal two-round MPC
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Two-round MPC: information-theoretic and black-box
- Correlated pseudorandomness from expand-accumulate codes
- Function secret sharing for mixed-mode and fixed-point secure computation
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Sublinear-communication secure multiparty computation does not require FHE
- Breaking the circuit size barrier for secure computation under DDH
- Foundations of homomorphic secret sharing
- Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles
- Scooby: improved multi-party homomorphic secret sharing based on FHE
- Maliciously secure massively parallel computation for all-but-one corruptions
- Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions
- Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials
- The bottleneck complexity of secure multiparty computation
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Threshold garbled circuits and ad hoc secure computation
- CNF-FSS and its applications
- Spooky Encryption and Its Applications
- Round-optimal and communication-efficient multiparty computation
- Pseudorandom correlation functions from variable-density LPN, revisited
- Scooby: improved multi-party homomorphic secret sharing based on FHE
- Distributed (correlation) samplers: how to remove a trusted dealer in one round
- Single-server private information retrieval with sublinear amortized time
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments
- The rise of Paillier: homomorphic secret sharing and public-key silent OT
- Two-round maliciously-secure oblivious transfer with optimal rate
- From FE combiners to secure MPC and back
- Incrementally verifiable computation via incremental PCPs
- Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials
- Rate-1 quantum fully homomorphic encryption
- 10-party sublinear secure computation from standard assumptions
- Multikey fully homomorphic encryption and applications
- Verifiable decryption in the head
- Somewhere statistical soundness, post-quantum security, and SNARGs
- Succinct spooky free compilers are not black box sound
- Multi-key homomorphic secret sharing from LWE without multi-key HE
- Homomorphic secret sharing for low degree polynomials
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- On the local leakage resilience of linear secret sharing schemes
This page was built for publication: Spooky Encryption and Its Applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829944)