Cryptography in $NC^0$

From MaRDI portal
Publication:5757454

DOI10.1137/S0097539705446950zbMath1126.94014MaRDI QIDQ5757454

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz

Publication date: 7 September 2007

Published in: SIAM Journal on Computing (Search for Journal in Brave)




Related Items (52)

On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \)Expander-based cryptography meets natural proofsOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateStatistical Randomized Encodings: A Complexity Theoretic ViewFine-grained secure computationA dichotomy for local small-bias generatorsCryptographic hardness of random local functions. SurveyLocal expandersZero-information protocols and unambiguity in Arthur-Merlin communicationStrong Average-Case Circuit Lower Bounds from Nontrivial DerandomizationLocally computable UOWHF with linear shrinkageActively secure arithmetic computation and VOLE with constant computational overheadNon-adaptive universal one-way hash functions from arbitrary one-way functionsSampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible ErrorExplicit construction of \(q+1\) regular local Ramanujan graphs, for all prime-powers \(q\)Memory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesOblivious transfer with constant computational overheadTime-release cryptography from minimal circuit assumptionsQuadratic multiparty randomized encodings beyond honest majority and their applicationsAlgebraic Attacks against Random Local Functions and Their CountermeasuresFrom private simultaneous messages to zero-information Arthur-Merlin protocols and backAdditive randomized encodings and their applicationsUnnamed ItemCryptographic hardness under projections for time-bounded Kolmogorov complexityFoundations of Homomorphic Secret SharingA Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision MedicineInterleaved Group ProductsPerfect Secure Computation in Two RoundsMinimizing locality of one-way functions via semi-private randomized encodingsIncremental deterministic public-key encryptionCryptography with UpdatesInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Unnamed ItemInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Round-optimal secure multi-party computationFrom Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and BackOn the complexity of constructing pseudorandom functions (especially when they don't exist)Fine-grained cryptography revisitedOn perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelOn linear-size pseudorandom generators and hardcore functionsKey-dependent message security: generic amplification and completenessOn the power of secure two-party computationCandidate One-Way Functions Based on Expander GraphsA Candidate Counterexample to the Easy Cylinders ConjectureExpander-Based Cryptography Meets Natural ProofsOn the One-Way Function Candidate Proposed by GoldreichOn the Power of Secure Two-Party ComputationOn the Relationship Between Statistical Zero-Knowledge and Statistical Randomized EncodingsBounded Indistinguishability and the Complexity of Recovering SecretsCryptography with constant input localityUnnamed Item




This page was built for publication: Cryptography in $NC^0$