Communication preserving protocols for secure function evaluation
From MaRDI portal
Publication:5176017
Recommendations
- On the communication complexity of secure function evaluation with long output
- Communication protocols for secure distributed computation of binary functions.
- Minimal-latency secure function evaluation
- Actively Secure Private Function Evaluation
- Engineering secure two-party computation protocols. Design, optimization, and applications of efficient secure function evaluation
- On Function Computation With Privacy and Secrecy Constraints
- Rate-limited secure function evaluation: definitions and constructions
- Rate-limited secure function evaluation
- Designing fully secure protocols for secure two-party computation of constant-domain functions
Cites work
Cited in
(42)- Secure multiparty computation without one-way functions
- Communication protocols for secure distributed computation of binary functions.
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Two Party Distribution Testing: Communication and Security
- Communication optimal Tardos-based asymmetric fingerprinting
- On the communication required for unconditionally secure multiplication
- Information Security and Cryptology
- Secure computation from millionaire
- Fast Private Norm Estimation and Heavy Hitters
- Efficient set operations in the presence of malicious adversaries
- scientific article; zbMATH DE number 4051007 (Why is no real title available?)
- Breaking the circuit size barrier for secure computation under DDH
- On the communication complexity of secure function evaluation with long output
- Sublinear-communication secure multiparty computation does not require FHE
- Secure multiparty computation with sublinear preprocessing
- Cryptography and cryptographic protocols
- On the bottleneck complexity of MPC with correlated randomness
- Private multiparty sampling and approximation of vector combinations
- Sublinear secure computation from new assumptions
- Maliciously secure massively parallel computation for all-but-one corruptions
- Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
- Theory and Applications of Models of Computation
- The bottleneck complexity of secure multiparty computation
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs
- Multi-value private information retrieval with colluding databases via trace functions
- Breaking the circuit size barrier for secure computation under quasi-polynomial LPN
- Statistical Security Conditions for Two-Party Secure Function Evaluation
- scientific article; zbMATH DE number 1617945 (Why is no real title available?)
- Garbled circuit lookup tables with logarithmic number of ciphertexts
- Succinct homomorphic secret sharing
- Secure circuit evaluation. A protocol based on hiding information from an oracle
- Actively Secure Private Function Evaluation
- Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
- Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
- Sub-linear, secure comparison with two non-colluding parties
- 10-party sublinear secure computation from standard assumptions
- The hunting of the SNARK
- A balm: defend the clique-based attack from a fundamental aspect
- Minimal-latency secure function evaluation
- Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
- Secure computation of the median (and other elements of specified ranks)
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
This page was built for publication: Communication preserving protocols for secure function evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5176017)