Some Open Problems in Information-Theoretic Cryptography
From MaRDI portal
Publication:5136294
DOI10.4230/LIPIcs.FSTTCS.2017.5zbMath1493.94044OpenAlexW2788750140MaRDI QIDQ5136294
Publication date: 25 November 2020
Full work available at URL: https://doi.org/10.4230/LIPIcs.FSTTCS.2017.5
cryptographysecret sharinginformation-theoretic securityprivate information retrievalmultiparty computation
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information theory (general) (94A15) Information storage and retrieval of data (68P20) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Private simultaneous messages based on quadratic residues ⋮ On actively-secure elementary MPC reductions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- The size of a share must be large
- Protecting data privacy in private information retrieval schemes
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Conditional disclosure of secrets via non-linear reconstruction
- A minimal model for secure computation (extended abstract)
- On the Communication Complexity of Secure Computation
- 2-Server PIR with Sub-Polynomial Communication
- Communication and Randomness Lower Bounds for Secure Computation
- Secret-Sharing Schemes: A Survey
- How to share a secret
- Private information retrieval
- On the efficiency of local decoding procedures for error-correcting codes
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
- The Wire-Tap Channel
- Simultaneous messages vs. communication
- Fully homomorphic encryption using ideal lattices
- Advances in Cryptology - EUROCRYPT 2004
- Information Security
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Theory of Cryptography
- Automata, Languages and Programming
- Automata, Languages and Programming
- On the Cryptographic Complexity of the Worst Functions
This page was built for publication: Some Open Problems in Information-Theoretic Cryptography