Two-round adaptively secure MPC from isogenies, LPN, or CDH
From MaRDI portal
Publication:6157520
DOI10.1007/978-3-030-92075-3_11zbMATH Open1514.94029OpenAlexW3206438280MaRDI QIDQ6157520FDOQ6157520
Authors: Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92075-3_11
Recommendations
Cites Work
- Bit commitment using pseudorandomness
- A proof of security of Yao's protocol for two-party computation
- Efficient oblivious transfer protocols
- A Framework for Efficient and Composable Oblivious Transfer
- Smooth projective hashing and two-message oblivious transfer
- Title not available (Why is that?)
- Universally composable two-party and multi-party secure computation
- Title not available (Why is that?)
- Adaptive versus non-adaptive security of multi-party protocols
- Adaptively secure multi-party computation with dishonest majority
- Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
- Improved non-committing encryption with applications to adaptively secure protocols
- Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- CSIDH: an efficient post-quantum commutative group action
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Multiparty generation of an RSA modulus
- Verifiable delay functions from supersingular isogenies and pairings
- Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
- Constant ciphertext-rate non-committing encryption from standard assumptions
- Two-round adaptively secure multiparty computation from standard assumptions
- Two-message statistically sender-private OT from LWE
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- Distinguisher-dependent simulation in two rounds and its applications
- Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
- Better two-round adaptive multi-party computation
- Two round multiparty computation via multi-key FHE
- Two-round secure MPC from indistinguishability obfuscation
- Faster algorithms for isogeny problems using torsion point images
- Optimal-rate non-committing encryption
- Adaptively secure MPC with sublinear communication complexity
- Rational isogenies from irrational endomorphisms
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Two-round oblivious transfer from CDH or LPN
- Cryptographic group actions and applications
- A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement
- Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem
- On Black-Box Complexity of Universally Composable Security in the CRS Model
Cited In (9)
- Reusable two-round MPC from LPN
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- Robustly reusable fuzzy extractor from isogeny
- Two-round adaptively secure multiparty computation from standard assumptions
- Triply adaptive UC NIZK
- New proof systems and an OPRF from CSIDH
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Statistical security in two-party computation revisited
This page was built for publication: Two-round adaptively secure MPC from isogenies, LPN, or CDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157520)