Oblivious transfer with constant computational overhead
From MaRDI portal
Publication:6138086
DOI10.1007/978-3-031-30545-0_10zbMATH Open1530.94023OpenAlexW4365935939MaRDI QIDQ6138086FDOQ6138086
Authors: Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Publication date: 16 January 2024
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30545-0_10
Recommendations
- Cryptography with constant computational overhead
- More efficient oblivious transfer extensions
- Founding Cryptography on Oblivious Transfer – Efficiently
- Actively secure garbled circuits with constant communication overhead in the plain model
- Actively secure garbled circuits with constant communication overhead in the plain model
constant-overhead pseudorandom correlation generatorsecure two-party computation of Boolean circuits
Cites Work
- Security and composition of multiparty cryptographic protocols
- New Algorithms for Learning in Presence of Errors
- Title not available (Why is that?)
- Founding Cryptography on Oblivious Transfer – Efficiently
- Advances in Cryptology - CRYPTO 2003
- Foundations of Cryptography
- Candidate one-way functions based on expander graphs
- A dichotomy for local small-bias generators
- Cryptography with constant computational overhead
- Title not available (Why is that?)
- Cryptography in $NC^0$
- On the one-way function candidate proposed by Goldreich
- Cryptographic hardness of random local functions. Survey
- Locally computable UOWHF with linear shrinkage
- On the Security of Goldreich’s One-Way Function
- Progress in Cryptology – Mycrypt 2005
- Extracting correlations
- Pseudorandom generators with long stretch and low locality from random local one-way functions
- Circuits resilient to additive attacks with applications to secure computation
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- On linear-size pseudorandom generators and hardcore functions
- Constrained pseudorandom functions and their applications
- Title not available (Why is that?)
- Secure non-interactive simulation: feasibility and rate
- On the power of correlated randomness in secure computation
- Proving as fast as computing: succinct arguments with constant prover overhead
- Secure arithmetic computation with constant computational overhead
- Function secret sharing
- Binary AMD circuits from secure multiparty computation
- Actively secure OT extension with optimal overhead
- Cryptographic hardness of random local functions -- survey
- Functional signatures and pseudorandom functions
- Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation
- Distributed Point Functions and Their Applications
- TinyKeys: a new approach to efficient multi-party computation
- Quasi-optimal SNARGs via linear multi-prover interactive proofs
- Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
- On the concrete security of Goldreich's pseudorandom generator
- Efficient pseudorandom correlation generators from ring-LPN
- Efficient pseudorandom correlation generators: silent OT extension and more
- Low-complexity cryptographic hash functions
- Algebraic attacks against random local functions and their countermeasures
- More efficient oblivious transfer extensions
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- Asymptotically quasi-optimal cryptography
- Secure non-interactive reduction and spectral analysis of correlations
- XOR codes and sparse learning parity with noise
- Correlated pseudorandomness from expand-accumulate codes
- On perfectly secure 2PC in the OT-hybrid model
- Faster sounder succinct arguments and \textsf{IOP}s
- The exact complexity of pseudorandom functions and the black-box natural proof barrier for bootstrapping results in computational complexity
Cited In (1)
This page was built for publication: Oblivious transfer with constant computational overhead
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6138086)