Theory of Cryptography

From MaRDI portal
Publication:5711651

DOI10.1007/b106171zbMath1079.94541OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711651

Yuval Ishai, Ronald Cramer, Ivan B. Damgård

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b106171




Related Items (38)

Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing ProtocolFluid MPC: secure multiparty computation with dynamic participantsFROST: Flexible round-optimized Schnorr threshold signaturesBest possible information-theoretic MPCExploring crypto dark matter: new simple PRF candidates and their applicationsBinary AMD Circuits from Secure Multiparty ComputationImproving the efficiency of AES protocols in multi-party computationEfficient noise generation to achieve differential privacy with applications to secure multiparty computationImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsComplexity and performance of secure floating-point polynomial evaluation protocolsDistributed (correlation) samplers: how to remove a trusted dealer in one roundCNF-FSS and Its ApplicationsOn optimal cryptographic key derivationHigh-throughput secure three-party computation with an honest majorityMPClan: protocol suite for privacy-conscious computationsPrio+: privacy preserving aggregate statistics via Boolean sharesLinear-time 2-party secure merge from additively homomorphic encryptionEfficient fully secure computation via distributed zero-knowledge proofsRandom-index PIR and applicationsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsSimplified Submission of Inputs to ProtocolsImproved building blocks for secure multi-party computation based on secret sharing with honest majorityA practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationalsMulti-party computation with conversion of secret sharingFast large-scale honest-majority MPC for malicious adversariesSecure Outsourced ComputationGeneral constructions for information-theoretic private information retrievalOT-Combiners via Secure ComputationOn the local leakage resilience of linear secret sharing schemesDistributed key generation for SM9-based systemsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsBreaking the Circuit Size Barrier for Secure Computation Under DDHEfficient, Robust and Constant-Round Distributed RSA Key GenerationThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computationMPC with friends and foesMultiparty generation of an RSA modulusUnnamed Item






This page was built for publication: Theory of Cryptography