Evaluating Branching Programs on Encrypted Data
From MaRDI portal
Publication:3596400
Recommendations
Cited in
(82)- Breaking the circuit size barrier for secure computation under DDH
- Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems
- Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)
- Bounded size-hiding private set intersection
- Mechanism design in large games: incentives and privacy (extended abstract)
- Private interactive communication across an adversarial channel
- Amortizing rate-1 OT and applications to PIR and PSI
- Laconic private set intersection and applications
- Tree codes and a conjecture on exponential sums
- Size-Hiding Computation for Multiple Parties
- FHE circuit privacy almost for free
- Two-message, oblivious evaluation of cryptographic functionalities
- Circuit-private multi-key FHE
- Sequential decision making with vector outcomes
- An efficient protocol for oblivious DFA evaluation and applications
- Energy-efficient circuit design
- Limits of local algorithms over sparse random graphs
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
- On the automorphism groups of strongly regular graphs. I
- Complexity of approximating CSP with balance / hard constraints
- Rational arguments: single round delegation with sublinear verification
- Private information retrieval with sublinear online time
- Homomorphic encryption
- Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
- Capacity of non-malleable codes
- Attribute-efficient evolvability of linear functions
- Integer feasibility of random polytopes: random integer programs
- Lattice-based FHE as secure as PKE
- Rate-independent computation in continuous chemical reaction networks
- Testers and their applications
- Limits of random oracles in secure computation (extended abstract)
- Building one-time memories from isolated qubits (extended abstract)
- (Leveled) fully homomorphic encryption without bootstrapping
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- Cryptanalyses of Candidate Branching Program Obfuscators
- A simpler rate-optimal CPIR protocol
- Adversarial hypothesis testing and a quantum Stein's lemma for restricted measurements (extended abstract)
- Iterated group products and leakage resilience against \(\mathrm{NC}^1\)
- Decision trees, protocols and the entropy-influence conjecture
- Black-box obfuscation for \(d\)-CNFs
- Coordination mechanisms from (almost) all scheduling policies
- Deterministic compression with uncertain priors
- Learning mixtures of arbitrary distributions over large discrete domains
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Why do simple algorithms for triangle enumeration work in the real world?
- Welfare maximization and truthfulness in mechanism design with ordinal preferences
- Rate-limited secure function evaluation: definitions and constructions
- Maliciously circuit-private multi-key FHE and MPC based on LWE
- Redrawing the boundaries on purchasing data from privacy-sensitive individuals
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Efficient and scalable universal circuits
- Cryptogenography
- Rate-limited secure function evaluation
- scientific article; zbMATH DE number 3952653 (Why is no real title available?)
- Direct sum fails for zero error average communication
- Invitation games and the price of stability
- Parameterized testability
- Towards Robust Computation on Encrypted Data
- Faster private release of marginals on small databases
- Non-commutative arithmetic circuits with division
- Multireference alignment using semidefinite programming
- Locally testable codes and Cayley graphs
- Communication optimal Tardos-based asymmetric fingerprinting
- Automata evaluation and text search protocols with simulation-based security
- Partial tests, universal tests and decomposability
- High dimensional expanders and property testing
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- A framework for statistically sender private OT with optimal rate
- Algebraic restriction codes and their applications
- Credibility in private set membership
- On the Hardness of Scheme-Switching Between SIMD FHE Schemes
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- Simulatable adaptive oblivious transfer with statistical receiver's privacy
- Generic constant-round oblivious sorting algorithm for MPC
- Combinatorially homomorphic encryption
- Anonymous permutation routing
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Laconic branching programs from the Diffie-Hellman assumption
- Lower-bounds on public-key operations in PIR
- Expanders with respect to Hadamard spaces and random graphs (extended abstract)
- On the bottleneck complexity of MPC with correlated randomness
- Adaptive oblivious transfer with access control from lattice assumptions
This page was built for publication: Evaluating Branching Programs on Encrypted Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596400)