Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
From MaRDI portal
Publication:5261691
DOI10.1007/978-3-662-46497-7_22zbMATH Open1382.94077OpenAlexW823527867MaRDI QIDQ5261691FDOQ5261691
Ran Canetti, Oxana Poburinnaya, Shafi Goldwasser
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_22
Cited In (19)
- Leakage resilience from program obfuscation
- Better Two-Round Adaptive Multi-party Computation
- Adaptively secure computation for RAM programs
- On constructing one-way permutations from indistinguishability obfuscation
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
- Two-round adaptively secure multiparty computation from standard assumptions
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
- Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
- Constant-round leakage-resilient zero-knowledge from collision resistance
- Two-round adaptively secure MPC from isogenies, LPN, or CDH
- On Constructing One-Way Permutations from Indistinguishability Obfuscation
- Multiparty reusable non-interactive secure computation from LWE
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Adaptively secure MPC with sublinear communication complexity
- On Adaptively Secure Multiparty Computation with a Short CRS
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Efficient one-sided adaptively secure computation
- One-Sided Adaptively Secure Two-Party Computation
Recommendations
- Title not available (Why is that?) π π
- Title not available (Why is that?) π π
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries π π
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries π π
- An efficient protocol for secure two-party computation in the presence of malicious adversaries π π
- Adaptively Secure Two-Party Computation with Erasures π π
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation π π
- One-Sided Adaptively Secure Two-Party Computation π π
- Two-round adaptively secure multiparty computation from standard assumptions π π
- Efficient Two Party and Multi Party Computation Against Covert Adversaries π π
This page was built for publication: Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261691)