Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311543

DOI10.1007/b99099zbMath1104.94027OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311543

Rafail Ostrovsky, Jonathan N. Katz

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (49)

On the round complexity of black-box secure MPCRound optimal black-box ``commit-and-provePattern matching on encrypted streamsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityMore Efficient Constant-Round Multi-party Computation from BMR and SHERound-optimal and communication-efficient multiparty computationRound-optimal multi-party computation with identifiable abortA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementA note on constant-round zero-knowledge proofs of knowledgeOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsBounded Collusion ABE for TMs from IBEMaliciously-secure MrNISC in the plain modelStatistical security in two-party computation revisitedRound-optimal black-box secure computation from two-round malicious OTKnowledge encryption and its applications to simulatable protocols with low round-complexityConstant-round adaptive zero-knowledge proofs for NPBest of both worlds. Revisiting the spymasters double agent problemRound-optimal black-box MPC in the plain modelReusable secure computation in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingRate-1 quantum fully homomorphic encryptionTwo-round maliciously secure computation with super-polynomial simulationOblivious transfer from trapdoor permutations in minimal roundsNon-interactive secure computation from one-way functionsEfficient one-sided adaptively secure computationComputing boundary cycle of a pseudo-triangle polygon from its visibility graphFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionOn the Exact Round Complexity of Self-composable Two-Party ComputationWhat security can we achieve within 4 rounds?Delayed-input cryptographic protocolsQuantum state secure transmission in network communicationsOn the exact round complexity of secure three-party computationImproved OR-Composition of Sigma-ProtocolsNon-interactive and non-malleable commitment scheme based on \(q\)-one way group homomorphisms\(k\)-critical graphs in \(P_5\)-free graphsOn the power of secure two-party computationAdaptively secure MPC with sublinear communication complexityTowards accountability in CRS generationOn Adaptively Secure Multiparty Computation with a Short CRSThe Feasibility of Outsourced Database Search in the Plain ModelWhat Security Can We Achieve Within 4 Rounds?On the Power of Secure Two-Party ComputationSpooky Encryption and Its ApplicationsConcurrent Non-Malleable Commitments (and More) in 3 RoundsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesOn black-box complexity of universally composable security in the CRS modelStacked garbling. Garbled circuit proportional to longest execution pathBetter concrete security for half-gates garbling (in the multi-instance setting)Succinct non-interactive secure computation






This page was built for publication: Advances in Cryptology – CRYPTO 2004