Secure Computation on the Web: Computing without Simultaneous Interaction

From MaRDI portal
Publication:5199188

DOI10.1007/978-3-642-22792-9_8zbMath1287.94070OpenAlexW1519947574MaRDI QIDQ5199188

Benny Pinkas, Yehuda Lindell, Shai Halevi

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_8




Related Items (29)

Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensionsEvolving homomorphic secret sharing for hierarchical access structuresBest possible information-theoretic MPCSuccinct garbling schemes from functional encryption through a local simulation paradigmPrivacy Assurances in Multiple Data-Aggregation TransactionsOn the Bottleneck Complexity of MPC with Correlated RandomnessIs information-theoretic topology-hiding computation possible?Multi-key and multi-input predicate encryption from learning with errorsHow to obfuscate MPC inputsTowards practical topology-hiding computationMultikey Fully Homomorphic Encryption and ApplicationsReusable secure computation in the plain modelSecure computation with shared EPR pairs (or: how to teleport in zero-knowledge)On the exact round complexity of best-of-both-worlds multi-party computationTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computationBlockchains enable non-interactive MPCMust the communication graph of MPC protocols be an expander?Perfect Secure Computation in Two RoundsCircuit-Private Multi-key FHEScalable Multi-party Private Set-IntersectionBeyond honest majority: the round complexity of fair and robust multi-party computationTopology-hiding computation on all graphsOn the exact round complexity of secure three-party computationOn the enumeration of minimal non-pairwise compatibility graphsThreshold garbled circuits and ad hoc secure computationMPC with friends and foesTopology-Hiding Computation Beyond Logarithmic DiameterBroadcast-optimal two-round MPC






This page was built for publication: Secure Computation on the Web: Computing without Simultaneous Interaction