Distributed Point Functions and Their Applications

From MaRDI portal
Publication:5418720

DOI10.1007/978-3-642-55220-5_35zbMath1328.68054OpenAlexW139740867WikidataQ63090561 ScholiaQ63090561MaRDI QIDQ5418720

Yuval Ishai, Niv Gilboa

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_35




Related Items (36)

Tweakable block ciphers secure beyond the birthday bound in the ideal cipher modelTargeted lossy functions and applicationsFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsLightweight, maliciously secure verifiable function secret sharingSingle-server private information retrieval with sublinear amortized timeReusable Two-Round MPC from LPNLow-Communication Multiparty Triple Generation for SPDZ from Ring-LPNCNF-FSS and Its ApplicationsSecure computation with preprocessing via function secret sharingMPCCache: privacy-preserving multi-party cooperative cache sharing at the edgeSublinear-communication secure multiparty computation does not require FHEOn homomorphic secret sharing from polynomial-modulus LWEPseudorandom correlation functions from variable-density LPN, revisitedPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessProgrammable distributed point functions3-party distributed ORAM from oblivious set membershipScooby: improved multi-party homomorphic secret sharing based on FHEStreaming and unbalanced PSI from function secret sharingOblivious transfer with constant computational overheadOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingScooby: improved multi-party homomorphic secret sharing based on FHEHalf-tree: halving the cost of tree expansion in COT and DPFMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNMulti-client oblivious RAM with poly-logarithmic communicationHomomorphic secret sharing for low degree polynomialsFoundations of Homomorphic Secret SharingConstraining Pseudorandom Functions PrivatelyPrivate Puncturable PRFs from Standard Lattice AssumptionsPrivate information retrieval with sublinear online timeThe rise of Paillier: homomorphic secret sharing and public-key silent OTBreaking the circuit size barrier for secure computation under quasi-polynomial LPNSpooky Encryption and Its ApplicationsAdaptively Secure Garbled Circuits from One-Way FunctionsBreaking the Circuit Size Barrier for Secure Computation Under DDHEfficient pseudorandom correlation generators from ring-LPN




This page was built for publication: Distributed Point Functions and Their Applications