Leakage-Tolerant Computation with Input-Independent Preprocessing
From MaRDI portal
Publication:2874535
DOI10.1007/978-3-662-44381-1_9zbMath1334.68078OpenAlexW2245251610MaRDI QIDQ2874535
Dana Dachman-Soled, Huijia Lin, Nir Bitansky
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_9
Cryptography (94A60) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Related Items (11)
Constant-round leakage-resilient zero-knowledge from collision resistance ⋮ Survey of information security ⋮ Adaptively secure computation for RAM programs ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Fully Leakage-Resilient Codes ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Continuous leakage-resilient certificate-based encryption ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
This page was built for publication: Leakage-Tolerant Computation with Input-Independent Preprocessing