3-party secure computation for RAMs: optimal and concretely efficient
From MaRDI portal
Publication:6581802
DOI10.1007/978-3-031-48615-9_17zbMATH Open1544.94253MaRDI QIDQ6581802FDOQ6581802
Ryo Kikuchi, Atsunori Ichikawa, Koki Hamada, Dai Ikarashi, Ilan Komargodski
Publication date: 1 August 2024
concretely-efficient 3-party oblivious permutation protocoldistributed oblivious random access memorymalicious attackers
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Database theory (68P15) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- How to share a secret
- Relations Among Complexity Measures
- Security and composition of multiparty cryptographic protocols
- Cuckoo hashing
- Theory of Cryptography
- Software protection and simulation on oblivious RAMs
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
- More Robust Hashing: Cuckoo Hashing with a Stash
- Ciphers for MPC and FHE
- Circuits resilient to additive attacks with applications to secure computation
- Fast large-scale honest-majority MPC for malicious adversaries
- Improved Primitives for Secure Multiparty Integer Computation
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
- Circuit OPRAM: unifying statistically and computationally secure ORAMs and OPRAMs
- Three-Party ORAM for Secure Computation
- Distributed Oblivious RAM for Secure Two-Party Computation
- Efficient 3-party distributed ORAM
- OptORAMa: optimal oblivious RAM
- Alibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solution
- Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits
- Field extension in secret-shared form and its applications to efficient secure computation
- Secure Multiparty AES
- Oblivious RAM with \textit{worst-case} logarithmic overhead
- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting
- 3-party distributed ORAM from oblivious set membership
Cited In (1)
This page was built for publication: 3-party secure computation for RAMs: optimal and concretely efficient
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6581802)