From Secrecy to Soundness: Efficient Verification via Secure Computation

From MaRDI portal
Publication:3587376

DOI10.1007/978-3-642-14165-2_14zbMath1287.68041OpenAlexW1521660974MaRDI QIDQ3587376

Eyal Kushilevitz, Yuval Ishai, Benny Applebaum

Publication date: 7 September 2010

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14165-2_14



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (31)

Statistical Randomized Encodings: A Complexity Theoretic ViewSuccinct non-interactive arguments via linear interactive proofsFine-grained secure computationSuccinct garbling schemes from functional encryption through a local simulation paradigmIncompressible functions, relative-error extractors, and the power of nondeterministic reductionsVerifiable Computation for Randomized AlgorithmArguments of ProximityIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsRefereed delegation of computationBatch verifiable computation of outsourced functionsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysMultikey Fully Homomorphic Encryption and ApplicationsDoubly efficient interactive proofs over infinite and non-commutative ringsThe hunting of the SNARKPublicly verifiable database scheme with efficient keyword searchUnnamed ItemAlgebraic (trapdoor) one-way functions: constructions and applicationsEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsPrivacy-preserving verifiable delegation of polynomial and matrix functionsMulti-server verifiable delegation of computations: unconditional security and practical efficiencyOn the power of secure two-party computationBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsThe Feasibility of Outsourced Database Search in the Plain ModelVerifiable Pattern Matching on Outsourced TextsOn Garbling Schemes with and Without PrivacyOn the Power of Secure Two-Party ComputationAdaptively Secure Garbled Circuits from One-Way FunctionsConstant-Round Interactive Proofs for Delegating ComputationGarbled Circuits as Randomized Encodings of Functions: a Primer




This page was built for publication: From Secrecy to Soundness: Efficient Verification via Secure Computation