Adaptive security of Yao's garbled circuits
From MaRDI portal
Publication:3179366
DOI10.1007/978-3-662-53641-4_17zbMATH Open1406.94068OpenAlexW2539309220MaRDI QIDQ3179366FDOQ3179366
Zahra Jafargholi, Daniel Wichs
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53641-4_17
Recommendations
Cites Work
- A proof of security of Yao's protocol for two-party computation
- Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Adaptively Secure Garbled Circuits from One-Way Functions
- Instantiating Random Oracles via UCEs
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- Adaptive Security of Constrained PRFs
- A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Cited In (18)
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
- On the exact round complexity of secure three-party computation
- Bounded Collusion ABE for TMs from IBE
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Adaptive distributional security for garbling schemes with \(\mathcal{O}(|x|)\) online complexity
- Compact NIZKs from standard assumptions on bilinear maps
- On treewidth, separators and Yao's garbling
- Threshold garbled circuits and ad hoc secure computation
- Limits on the adaptive security of Yao's garbling
- Compact NIZKs from standard assumptions on bilinear maps
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- On the power of secure two-party computation
- The cost of adaptivity in security games on graphs
- Security analysis and improvements for the IETF MLS standard for group messaging
- Adaptive security of practical garbling schemes
- Depth-Robust Graphs and Their Cumulative Memory Complexity
- Adaptively secure garbling schemes for parallel computations
This page was built for publication: Adaptive security of Yao's garbled circuits
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3179366)