Breaking the circuit size barrier for secure computation under DDH
From MaRDI portal
Publication:2835599
DOI10.1007/978-3-662-53018-4_19zbMATH Open1384.94038OpenAlexW2489433463MaRDI QIDQ2835599FDOQ2835599
Authors: Elette Boyle, Niv Gilboa, Yuval Ishai
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_19
Recommendations
- Homomorphic secret sharing from Paillier encryption
- Sublinear secure computation from new assumptions
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Secure multiparty computation with free branching
- An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Cites Work
- Bootstrapping for HElib
- Fully homomorphic encryption over the integers
- Evaluating Branching Programs on Encrypted Data
- Fully homomorphic encryption using ideal lattices
- Theory of Cryptography
- Linear-time encodable and decodable error-correcting codes
- Circular-Secure Encryption from Decision Diffie-Hellman
- Parallel collision search with cryptanalytic applications
- Multiparty computation with low communication, computation and interaction via threshold FHE
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Number-theoretic constructions of efficient pseudo-random functions
- Theory of Cryptography
- Title not available (Why is that?)
- 3-query locally decodable codes of subexponential length
- Communication preserving protocols for secure function evaluation
- Private Searching on Streaming Data
- Title not available (Why is that?)
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Private information retrieval
- Title not available (Why is that?)
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs
- Universal circuits (Preliminary Report)
- Spooky Encryption and Its Applications
- Function Secret Sharing
- Multi-identity and Multi-key Leveled FHE from Learning with Errors
- Two Round Multiparty Computation via Multi-key FHE
- Distributed Point Functions and Their Applications
- Communication Optimal Tardos-Based Asymmetric Fingerprinting
- A Depth-Universal Circuit
Cited In (56)
- Beyond MPC-in-the-head: black-box constructions of short zero-knowledge proofs
- Compact NIZKs from standard assumptions on bilinear maps
- Rate-1 fully local somewhere extractable hashing from DDH
- Efficient and generic methods to achieve active security in private information retrieval and more advanced database search
- Succinct homomorphic secret sharing
- 10-party sublinear secure computation from standard assumptions
- Multi-key homomorphic secret sharing from LWE without multi-key HE
- On homomorphic secret sharing from polynomial-modulus LWE
- Two Party Distribution Testing: Communication and Security
- Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation
- CNF-FSS and Its Applications
- Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs
- Title not available (Why is that?)
- Master-Key KDM-Secure IBE from Pairings
- Two-round MPC: information-theoretic and black-box
- Large message homomorphic secret sharing from DCR and applications
- Function secret sharing for mixed-mode and fixed-point secure computation
- Multi-client oblivious RAM with poly-logarithmic communication
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Sublinear-communication secure multiparty computation does not require FHE
- Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles
- Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?
- Sublinear secure computation from new assumptions
- Scooby: improved multi-party homomorphic secret sharing based on FHE
- An algebraic framework for silent preprocessing with trustless setup and active security
- A framework for statistically sender private OT with optimal rate
- Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
- Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials
- Correlation intractability and SNARGs from sub-exponential DDH
- An optimal distributed discrete log protocol with applications to homomorphic secret sharing
- Scooby: improved multi-party homomorphic secret sharing based on FHE
- Multi-theorem preprocessing NIZKs from lattices
- Batch-OT with optimal rate
- Highly efficient OT-based multiplication protocols
- Secure multiparty computation with free branching
- Compact designated verifier NIZKs from the CDH assumption without pairings
- Compact NIZKs from standard assumptions on bilinear maps
- Breaking the circuit size barrier for secure computation under quasi-polynomial LPN
- Non-interactive zero knowledge from sub-exponential DDH
- The rise of Paillier: homomorphic secret sharing and public-key silent OT
- Efficient pseudorandom correlation generators from ring-LPN
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
- Combiners for functional encryption, unconditionally
- A geometric approach to homomorphic secret sharing
- Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials
- Reusable Two-Round MPC from LPN
- Adaptively secure MPC with sublinear communication complexity
- Constrained pseudorandom functions from homomorphic secret sharing
- Amortizing rate-1 OT and applications to PIR and PSI
- Laconic private set intersection and applications
- Evolving homomorphic secret sharing for hierarchical access structures
- Foundations of Homomorphic Secret Sharing
- Homomorphic secret sharing for low degree polynomials
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- NIKE from affine determinant programs
- On the local leakage resilience of linear secret sharing schemes
Uses Software
This page was built for publication: Breaking the circuit size barrier for secure computation under DDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835599)