Evaluating Branching Programs on Encrypted Data
From MaRDI portal
Publication:3596400
DOI10.1007/978-3-540-70936-7_31zbMATH Open1156.94354OpenAlexW1518622464MaRDI QIDQ3596400FDOQ3596400
Authors: Yuval Ishai, Anat Paskin
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_31
Recommendations
Cited In (86)
- Combinatorially homomorphic encryption
- Anonymous permutation routing
- Expanders with respect to Hadamard spaces and random graphs (extended abstract)
- On the bottleneck complexity of MPC with correlated randomness
- A framework for statistically sender private OT with optimal rate
- Algebraic restriction codes and their applications
- Credibility in private set membership
- The truth behind the myth of the folk theorem
- Adaptive oblivious transfer with access control from lattice assumptions
- Laconic branching programs from the Diffie-Hellman assumption
- Lower-bounds on public-key operations in PIR
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- On the Hardness of Scheme-Switching Between SIMD FHE Schemes
- Simulatable adaptive oblivious transfer with statistical receiver's privacy
- Generic constant-round oblivious sorting algorithm for MPC
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Towards Robust Computation on Encrypted Data
- Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems
- Tree codes and a conjecture on exponential sums
- Limits of local algorithms over sparse random graphs
- Complexity of approximating CSP with balance / hard constraints
- FHE circuit privacy almost for free
- Cryptogenography
- Mechanism design in large games: incentives and privacy (extended abstract)
- Communication optimal Tardos-based asymmetric fingerprinting
- Capacity of non-malleable codes
- Testers and their applications
- A simpler rate-optimal CPIR protocol
- Deterministic compression with uncertain priors
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- Black-box obfuscation for \(d\)-CNFs
- Learning mixtures of arbitrary distributions over large discrete domains
- Sequential decision making with vector outcomes
- Decision trees, protocols and the entropy-influence conjecture
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Why do simple algorithms for triangle enumeration work in the real world?
- Decompositions of triangle-dense graphs
- Faster private release of marginals on small databases
- Automata evaluation and text search protocols with simulation-based security
- Breaking the circuit size barrier for secure computation under DDH
- Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)
- Locally testable codes and Cayley graphs
- Attribute-efficient evolvability of linear functions
- Lattice-based FHE as secure as PKE
- Rate-independent computation in continuous chemical reaction networks
- Adversarial hypothesis testing and a quantum Stein's lemma for restricted measurements (extended abstract)
- Iterated group products and leakage resilience against \(\mathrm{NC}^1\)
- Welfare maximization and truthfulness in mechanism design with ordinal preferences
- Private interactive communication across an adversarial channel
- Non-commutative arithmetic circuits with division
- Size-Hiding Computation for Multiple Parties
- Redrawing the boundaries on purchasing data from privacy-sensitive individuals
- Title not available (Why is that?)
- Multireference alignment using semidefinite programming
- Energy-efficient circuit design
- Rate-limited secure function evaluation
- Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
- Private information retrieval with sublinear online time
- Homomorphic encryption
- Limits of random oracles in secure computation (extended abstract)
- Direct sum fails for zero error average communication
- Invitation games and the price of stability
- Parameterized testability
- High dimensional expanders and property testing
- Bounded size-hiding private set intersection
- Circuit-private multi-key FHE
- Partial tests, universal tests and decomposability
- An efficient protocol for oblivious DFA evaluation and applications
- (Leveled) fully homomorphic encryption without bootstrapping
- Amortizing rate-1 OT and applications to PIR and PSI
- Laconic private set intersection and applications
- On the structure of Boolean functions with small spectral norm
- On the automorphism groups of strongly regular graphs. I
- Building one-time memories from isolated qubits (extended abstract)
- Coordination mechanisms from (almost) all scheduling policies
- Rate-limited secure function evaluation: definitions and constructions
- Maliciously circuit-private multi-key FHE and MPC based on LWE
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Quantum homomorphic encryption for polynomial-sized circuits
- Two-message, oblivious evaluation of cryptographic functionalities
- Rational arguments: single round delegation with sublinear verification
- Cryptanalyses of Candidate Branching Program Obfuscators
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
- Integer feasibility of random polytopes: random integer programs
- Efficient and scalable universal circuits
This page was built for publication: Evaluating Branching Programs on Encrypted Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596400)