Communication preserving protocols for secure function evaluation

From MaRDI portal
Publication:5176017

DOI10.1145/380752.380855zbMath1323.68317OpenAlexW2069717895MaRDI QIDQ5176017

Kobbi Nissim, Moni Naor

Publication date: 27 February 2015

Published in: Proceedings of the thirty-third annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/380752.380855




Related Items (23)

Secure multiparty computation with sublinear preprocessingOn the Bottleneck Complexity of MPC with Correlated RandomnessSublinear-communication secure multiparty computation does not require FHESublinear secure computation from new assumptionsMaliciously secure massively parallel computation for all-but-one corruptionsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsUnnamed ItemThe hunting of the SNARKMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNEfficient set operations in the presence of malicious adversariesCryptography and cryptographic protocolsGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCommunication Optimal Tardos-Based Asymmetric FingerprintingFast Private Norm Estimation and Heavy HittersSecure computation of the median (and other elements of specified ranks)Communication-Efficient Private Protocols for Longest Common SubsequencePrivate multiparty sampling and approximation of vector combinationsMulti-value private information retrieval with colluding databases via trace functionsBreaking the circuit size barrier for secure computation under quasi-polynomial LPNTwo Party Distribution Testing: Communication and SecurityOn the Communication Required for Unconditionally Secure MultiplicationBreaking the Circuit Size Barrier for Secure Computation Under DDHA balm: defend the clique-based attack from a fundamental aspect



Cites Work


This page was built for publication: Communication preserving protocols for secure function evaluation