Theory of Cryptography

From MaRDI portal
Publication:5711649

DOI10.1007/b106171zbMath1079.94546OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711649

Benny Pinkas, Michael J. Freedman, Omer Reingold, Yuval Ishai

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b106171




Related Items (43)

Efficient set intersection with simulation-based securityMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsRate-limited secure function evaluationPrivately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersA fast and simple partially oblivious PRF, with applicationsPrivate set intersection: new generic constructions and feasibility resultsA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionEfficient Computations over Encrypted Data BlocksAnonymous tokens with public metadata and applications to private contact tracingActively secure arithmetic computation and VOLE with constant computational overheadPrivate polynomial commitments and applications to MPCOblivious Keyword Search with AuthorizationSecure two-party input-size reduction: challenges, solutions and applicationsStructure-aware private set intersection, with applications to fuzzy matchingHow to obfuscate MPC inputs3-party distributed ORAM from oblivious set membershipCryptanalysis of an oblivious PRF from supersingular isogeniesParaDiSE: efficient threshold authenticated encryption in fully malicious modelMalicious secure, structure-aware private set intersection\textsf{Catalic}: delegated PSI cardinality with applications to contact tracingOblivious pseudorandom functions from isogeniesEfficient set operations in the presence of malicious adversariesOn the impossibility of structure-preserving deterministic primitivesReconstructing Generalized Staircase Polygons with Uniform Step LengthNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsOblivious polynomial evaluation and secure set-intersection from algebraic PRFsRate-Limited Secure Function Evaluation: Definitions and ConstructionsConstraining Pseudorandom Functions PrivatelyScalable Multi-party Private Set-IntersectionUniversally Composable Adaptive Oblivious TransferTowards Robust Computation on Encrypted DataEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesEfficient and secure outsourced approximate pattern matching protocolAdaptive oblivious transfer with access control from lattice assumptionsRound-optimal verifiable oblivious pseudorandom functions from ideal latticesOn the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blindingThe Feasibility of Outsourced Database Search in the Plain ModelTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesFunctional encryption for set intersection in the multi-client settingPrivate set intersection in the internet setting from lightweight oblivious PRFAugmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsPseudorandom Functions: Three Decades Later




This page was built for publication: Theory of Cryptography