Rate-Limited Secure Function Evaluation: Definitions and Constructions
From MaRDI portal
Publication:4916025
DOI10.1007/978-3-642-36362-7_28zbMath1314.94064MaRDI QIDQ4916025
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_28
foundations; secure function evaluation; oracle attacks; secure metering; oblivious polynomial evaluation
94A60: Cryptography
Related Items
Rate-Limited Secure Function Evaluation: Definitions and Constructions, Rate-limited secure function evaluation, A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations, Impossibility of Black-Box Simulation Against Leakage Attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Oblivious keyword search
- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
- Efficient Set Operations in the Presence of Malicious Adversaries
- Text Search Protocols with Simulation Based Security
- Evaluating Branching Programs on Encrypted Data
- Distributed Private Data Analysis: Simultaneously Solving How and What
- Asynchronous Multiparty Computation: Theory and Implementation
- Secure Multiparty Computation Goes Live
- Rate-Limited Secure Function Evaluation: Definitions and Constructions
- Efficient Two-Party Secure Computation on Committed Inputs
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Theory of Cryptography