Rate-limited secure function evaluation
From MaRDI portal
Publication:329720
DOI10.1016/J.TCS.2016.09.020zbMATH Open1353.94045OpenAlexW2530989744MaRDI QIDQ329720FDOQ329720
Payman Mohassel, Özgür Dagdelen, D. Venturi
Publication date: 21 October 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.09.020
Recommendations
- Rate-limited secure function evaluation: definitions and constructions
- Minimal-latency secure function evaluation
- Constant-round private function evaluation with linear complexity
- Linear-Complexity Private Function Evaluation is Practical
- On the communication complexity of secure function evaluation with long output
Cites Work
- Asynchronous Multiparty Computation: Theory and Implementation
- Evaluating Branching Programs on Encrypted Data
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- A proof of security of Yao's protocol for two-party computation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Title not available (Why is that?)
- Efficient Two-Party Secure Computation on Committed Inputs
- Theory of Cryptography
- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
- Distributed Private Data Analysis: Simultaneously Solving How and What
- Efficient set operations in the presence of malicious adversaries
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Foundations of Cryptography
- Oblivious keyword search
- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- Text Search Protocols with Simulation Based Security
- Efficient Protocols for Set Membership and Range Proofs
- Secure Multiparty Computation Goes Live
- Title not available (Why is that?)
- Rate-Limited Secure Function Evaluation: Definitions and Constructions
- Advances in Cryptology - EUROCRYPT 2004
- Outsourced Pattern Matching
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2006
- Theory of Cryptography
Cited In (2)
Uses Software
This page was built for publication: Rate-limited secure function evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q329720)