Recommendations
- Rate-limited secure function evaluation: definitions and constructions
- Minimal-latency secure function evaluation
- Constant-round private function evaluation with linear complexity
- Linear-Complexity Private Function Evaluation is Practical
- On the communication complexity of secure function evaluation with long output
Cites work
- scientific article; zbMATH DE number 1618044 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 1030985 (Why is no real title available?)
- scientific article; zbMATH DE number 1406779 (Why is no real title available?)
- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations
- A proof of security of Yao's protocol for two-party computation
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Asynchronous Multiparty Computation: Theory and Implementation
- Computationally secure pattern matching in the presence of malicious adversaries
- Distributed Private Data Analysis: Simultaneously Solving How and What
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Efficient Protocols for Set Membership and Range Proofs
- Efficient Two-Party Secure Computation on Committed Inputs
- Efficient fully-simulatable oblivious transfer
- Efficient set operations in the presence of malicious adversaries
- Evaluating Branching Programs on Encrypted Data
- Foundations of Cryptography
- Linear-complexity private set intersection protocols secure in malicious model
- Oblivious keyword search
- Outsourced pattern matching
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Public Key Cryptography - PKC 2006
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Rate-limited secure function evaluation: definitions and constructions
- Secure multiparty computation goes live
- Text search protocols with simulation based security
- Theory of Cryptography
- Theory of Cryptography
Cited in
(3)
This page was built for publication: Rate-limited secure function evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q329720)