Two-round adaptively secure MPC from isogenies, LPN, or CDH
From MaRDI portal
Publication:6157520
Recommendations
Cites work
- scientific article; zbMATH DE number 3856987 (Why is no real title available?)
- scientific article; zbMATH DE number 1256784 (Why is no real title available?)
- A Framework for Efficient and Composable Oblivious Transfer
- A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement
- A proof of security of Yao's protocol for two-party computation
- Adaptive versus non-adaptive security of multi-party protocols
- Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
- Adaptively secure MPC with sublinear communication complexity
- Adaptively secure multi-party computation with dishonest majority
- Better two-round adaptive multi-party computation
- Bit commitment using pseudorandomness
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Constant ciphertext-rate non-committing encryption from standard assumptions
- Cryptographic group actions and applications
- Distinguisher-dependent simulation in two rounds and its applications
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- Efficient oblivious transfer protocols
- Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
- Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
- Faster algorithms for isogeny problems using torsion point images
- Improved non-committing encryption with applications to adaptively secure protocols
- Multiparty generation of an RSA modulus
- Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem
- On Black-Box Complexity of Universally Composable Security in the CRS Model
- Optimal-rate non-committing encryption
- Rational isogenies from irrational endomorphisms
- Smooth projective hashing and two-message oblivious transfer
- Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
- Two round multiparty computation via multi-key FHE
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Two-message statistically sender-private OT from LWE
- Two-round adaptively secure multiparty computation from standard assumptions
- Two-round multiparty secure computation from minimal assumptions
- Two-round oblivious transfer from CDH or LPN
- Two-round secure MPC from indistinguishability obfuscation
- Universally composable two-party and multi-party secure computation
- Verifiable delay functions from supersingular isogenies and pairings
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
Cited in
(9)- Robustly reusable fuzzy extractor from isogeny
- Triply adaptive UC NIZK
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Two-round adaptively secure multiparty computation from standard assumptions
- Statistical security in two-party computation revisited
- New proof systems and an OPRF from CSIDH
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Reusable two-round MPC from LPN
This page was built for publication: Two-round adaptively secure MPC from isogenies, LPN, or CDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157520)