Secure Computation from Leaky Correlated Randomness
From MaRDI portal
Publication:3457091
DOI10.1007/978-3-662-48000-7_34zbMath1352.94038OpenAlexW2295623782MaRDI QIDQ3457091
Divya Gupta, Hemanta K. Maji, Yuval Ishai, Amit Sahai
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_34
Cryptography (94A60) Probability in computer science (algorithm analysis, random structures, phase transitions, etc.) (68Q87)
Related Items (2)
Secure computation using leaky correlations (asymptotically optimal constructions) ⋮ Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
Cites Work
- Unnamed Item
- On the asymptotic behaviour of some towers of function fields over finite fields
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Secure Computation against Adaptive Auxiliary Information
- Leakage-Resilient Circuits without Computational Assumptions
- Leakage-Tolerant Interactive Protocols
- A New Approach to Practical Active-Secure Two-Party Computation
- After-the-Fact Leakage in Public-Key Encryption
- Error-Tolerant Combiners for Oblivious Primitives
- Robuster Combiners for Oblivious Transfer
- Founding Cryptography on Oblivious Transfer – Efficiently
- Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Privacy Amplification by Public Discussion
- Random Cayley graphs and expanders
- Tiny families of functions with random properties: A quality-size trade-off for hashing
- Generalized privacy amplification
- Masking against Side-Channel Attacks: A Formal Security Proof
- On Robust Combiners for Oblivious Transfer and Other Primitives
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- OT-Combiners via Secure Computation
- On Robust Combiners for Private Information Retrieval and Other Primitives
This page was built for publication: Secure Computation from Leaky Correlated Randomness