scientific article; zbMATH DE number 1304086

From MaRDI portal
Publication:4250776

zbMath0932.68042MaRDI QIDQ4250776

Markus A. Stadler, Christian Cachin, Silvio Micali

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

On the privacy of a code-based single-server computational PIR schemeSelling multiple secrets to a single buyerSQL on structurally-encrypted databasesTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timePrivacy-preserving inverse distance weighted interpolationZero-knowledge proofs for set membership: efficient, succinct, modularThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesSingle-server private information retrieval with sublinear amortized timeInstantiability of RSA-OAEP under chosen-plaintext attackFrom Identification to Signatures, Tightly: A Framework and Generic TransformsLocally verifiable signature and key aggregationSublinear secure computation from new assumptionsSuccinct NP Proofs from an Extractability AssumptionInner product functional commitments with constant-size public parameters and openingsOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingPrivacy-enhanced attribute-based private information retrievalUnnamed ItemA proposal for device independent probabilistic quantum oblivious transferThe hunting of the SNARKDividing secrets to secure data outsourcing\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHImproved and formal proposal for device-independent quantum private query *More constructions of lossy and correlation-secure trapdoor functionsIncrementally aggregatable vector commitments and applications to verifiable decentralized storageSimple and efficient two-server ORAMHomomorphic secret sharing for low degree polynomialsOn the tightness of forward-secure signature reductionsLossy Identification Schemes from Decisional RSAПротокол конфиденциального получения информацииImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionOptimal security proofs for full domain hash. RevisitedTighter Reductions for Forward-Secure Signature SchemesPipelined algorithms to detect cheating in long-term grid computationsAsymptotically Tight Bounds for Composing ORAM with PIRGeneral constructions for information-theoretic private information retrievalZero-knowledge proofs for set membership: efficient, succinct, modularOn the Validity of the Φ-Hiding Assumption in Cryptographic ProtocolsFast Private Norm Estimation and Heavy HittersA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn Basing Private Information Retrieval on NP-HardnessCryptographic Assumptions: A Position PaperSecure computation of the median (and other elements of specified ranks)Practical Techniques Building on Encryption for Protecting and Managing Data in the CloudPrivate Information Retrieval with Preprocessing Based on the Approximate GCD ProblemPrivate multiparty sampling and approximation of vector combinationsMinicrypt primitives with algebraic structure and applicationsVerifiable single-server private information retrieval from LWE with binary errorsPublic Key Locally Decodable Codes with Short KeysPrivate information retrieval with sublinear online timeGeneral Construction of Chameleon All-But-One Trapdoor FunctionsMore efficient digital signatures with tight multi-user securitySpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsA Storage Efficient Redactable Signature in the Standard ModelOblivious keyword searchProtecting data privacy in private information retrieval schemesA Simpler Rate-Optimal CPIR ProtocolFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsPrivacy-Preserving Queries on Encrypted DataHomomorphic EncryptionSome Open Problems in Information-Theoretic Cryptography




This page was built for publication: