Some open problems in information-theoretic cryptography
From MaRDI portal
Publication:5136294
Recommendations
Cites work
- scientific article; zbMATH DE number 5604104 (Why is no real title available?)
- scientific article; zbMATH DE number 4037759 (Why is no real title available?)
- scientific article; zbMATH DE number 1304086 (Why is no real title available?)
- A minimal model for secure computation (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
- Automata, Languages and Programming
- Automata, Languages and Programming
- Communication and Randomness Lower Bounds for Secure Computation
- Communication complexity of conditional disclosure of secrets and attribute-based encryption
- Conditional disclosure of secrets via non-linear reconstruction
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully homomorphic encryption using ideal lattices
- How to share a secret
- Information Security
- On the Cryptographic Complexity of the Worst Functions
- On the communication complexity of secure computation
- On the efficiency of local decoding procedures for error-correcting codes
- Private information retrieval
- Protecting data privacy in private information retrieval schemes
- Quantum cryptography: public key distribution and coin tossing
- Secret-Sharing Schemes: A Survey
- Simultaneous messages vs. communication
- The Wire-Tap Channel
- The size of a share must be large
- Theory of Cryptography
Cited in
(7)- Information-theoretic Cryptography
- Explicit lower bounds for communication complexity of PSM for concrete functions
- Information theoretical cryptogenography
- On actively-secure elementary MPC reductions
- scientific article; zbMATH DE number 1418286 (Why is no real title available?)
- Introduction to the Special Issue on Information Theoretic Security
- Private simultaneous messages based on quadratic residues
This page was built for publication: Some open problems in information-theoretic cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5136294)