scientific article; zbMATH DE number 2086626

From MaRDI portal
Publication:4737161

zbMath1056.68088MaRDI QIDQ4737161

Yuval Ishai, Eyal Kushilevitz

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2380/23800244.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (47)

Broadcast-optimal two round MPC with an honest majorityPerfect secure computation in two roundsOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateStatistical Randomized Encodings: A Complexity Theoretic ViewSecure computation using leaky correlations (asymptotically optimal constructions)Fine-grained secure computationThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksTowards breaking the exponential barrier for general secret sharingZero-information protocols and unambiguity in Arthur-Merlin communicationStrong Average-Case Circuit Lower Bounds from Nontrivial DerandomizationCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsOn \(d\)-multiplicative secret sharing(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinActively secure arithmetic computation and VOLE with constant computational overheadCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsEfficient NIZKs for algebraic setsFrom private simultaneous messages to zero-information Arthur-Merlin protocols and backAdditive randomized encodings and their applicationsA framework for statistically sender private OT with optimal rateIndistinguishability obfuscationImproved Garbled Circuit: Free XOR Gates and ApplicationsInformation-theoretically secure MPC against mixed dynamic adversariesOn actively-secure elementary MPC reductionsMaliciously circuit-private multi-key FHE and MPC based on LWEAdaptively simulation-secure attribute-hiding predicate encryptionFoundations of Homomorphic Secret SharingPerfect Secure Computation in Two RoundsFunctional encryption for cubic polynomials and implementationMinimizing locality of one-way functions via semi-private randomized encodingsSecure computation without computersActively secure garbled circuits with constant communication overhead in the plain modelOn perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelKey-dependent message security: generic amplification and completenessOn the power of secure two-party computationCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Compact NIZKs from standard assumptions on bilinear mapsLarge scale, actively secure computation from LPN and free-XOR garbled circuitsUnnamed ItemCryptography with constant input localityNew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustGarbled Circuits as Randomized Encodings of Functions: a PrimerBroadcast-optimal two-round MPC




This page was built for publication: