Evaluating Branching Programs on Encrypted Data
From MaRDI portal
Publication:3596400
DOI10.1007/978-3-540-70936-7_31zbMATH Open1156.94354OpenAlexW1518622464MaRDI QIDQ3596400FDOQ3596400
Authors: Yuval Ishai, Anat Paskin
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_31
Recommendations
Cited In (86)
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Towards Robust Computation on Encrypted Data
- Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems
- Tree codes and a conjecture on exponential sums
- Limits of local algorithms over sparse random graphs
- Complexity of approximating CSP with balance / hard constraints
- FHE circuit privacy almost for free
- On the automorphism groups of strongly regular graphs I
- Cryptogenography
- Building one-time memories from isolated qubits
- Communication optimal Tardos-based asymmetric fingerprinting
- Capacity of non-malleable codes
- Testers and their applications
- Rational arguments
- Deterministic compression with uncertain priors
- Homomorphic Encryption
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- Learning mixtures of arbitrary distributions over large discrete domains
- Candidate weak pseudorandom functions in AC 0 ○ MOD 2
- Sequential decision making with vector outcomes
- Decision trees, protocols and the entropy-influence conjecture
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Why do simple algorithms for triangle enumeration work in the real world?
- Integer feasibility of random polytopes
- Decompositions of triangle-dense graphs
- Faster private release of marginals on small databases
- Automata evaluation and text search protocols with simulation-based security
- Breaking the circuit size barrier for secure computation under DDH
- Attribute-efficient evolvability of linear functions
- Mechanism design in large games
- Lattice-based FHE as secure as PKE
- Rate-independent computation in continuous chemical reaction networks
- Circuit-Private Multi-key FHE
- Welfare maximization and truthfulness in mechanism design with ordinal preferences
- Private interactive communication across an adversarial channel
- Black-box obfuscation for d-CNFs
- Non-commutative arithmetic circuits with division
- Size-Hiding Computation for Multiple Parties
- Redrawing the boundaries on purchasing data from privacy-sensitive individuals
- Title not available (Why is that?)
- Multireference alignment using semidefinite programming
- Energy-efficient circuit design
- Rate-limited secure function evaluation
- Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
- Locally testable codes and cayley graphs
- Private information retrieval with sublinear online time
- Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements
- Direct sum fails for zero error average communication
- Invitation games and the price of stability
- Iterated group products and leakage resilience against NC1
- Parameterized testability
- High dimensional expanders and property testing
- Bounded size-hiding private set intersection
- Partial tests, universal tests and decomposability
- An efficient protocol for oblivious DFA evaluation and applications
- (Leveled) fully homomorphic encryption without bootstrapping
- Amortizing rate-1 OT and applications to PIR and PSI
- Laconic private set intersection and applications
- On the structure of Boolean functions with small spectral norm
- Coordination mechanisms from (almost) all scheduling policies
- Rate-limited secure function evaluation: definitions and constructions
- Maliciously circuit-private multi-key FHE and MPC based on LWE
- Limits of random oracles in secure computation
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Quantum homomorphic encryption for polynomial-sized circuits
- Two-message, oblivious evaluation of cryptographic functionalities
- A Simpler Rate-Optimal CPIR Protocol
- Cryptanalyses of Candidate Branching Program Obfuscators
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
- Efficient and scalable universal circuits
- On the Bottleneck Complexity of MPC with Correlated Randomness
- Expanders with respect to Hadamard spaces and random graphs
- Combinatorially homomorphic encryption
- Anonymous permutation routing
- A framework for statistically sender private OT with optimal rate
- Algebraic restriction codes and their applications
- Credibility in private set membership
- The truth behind the myth of the folk theorem
- Adaptive oblivious transfer with access control from lattice assumptions
- Laconic branching programs from the Diffie-Hellman assumption
- Lower-bounds on public-key operations in PIR
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- On the Hardness of Scheme-Switching Between SIMD FHE Schemes
- Simulatable adaptive oblivious transfer with statistical receiver's privacy
- Generic constant-round oblivious sorting algorithm for MPC
This page was built for publication: Evaluating Branching Programs on Encrypted Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596400)