Pages that link to "Item:Q1678362"
From MaRDI portal
The following pages link to Laconic oblivious transfer and its applications (Q1678362):
Displaying 39 items.
- ``The simplest protocol for oblivious transfer'' revisited (Q783707) (← links)
- Registration-based encryption: removing private-key generator from IBE (Q1629445) (← links)
- A simple construction of iO for Turing machines (Q1631340) (← links)
- Succinct garbling schemes from functional encryption through a local simulation paradigm (Q1631342) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Oblivious transfer and privacy amplification (Q1879418) (← links)
- Incompressible encodings (Q2096497) (← links)
- New constructions of hinting PRGs, OWFs with encryption, and more (Q2096498) (← links)
- Verifiable registration-based encryption (Q2096501) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- Succinct non-interactive secure computation (Q2119013) (← links)
- Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\) (Q2152174) (← links)
- Batch-OT with optimal rate (Q2170043) (← links)
- Adaptively secure garbling schemes for parallel computations (Q2175942) (← links)
- Offline witness encryption with semi-adaptive security (Q2229274) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- Amortizing rate-1 OT and applications to PIR and PSI (Q2697889) (← links)
- Oblivious transfers and intersecting codes (Q3129464) (← links)
- Lower Bounds for Oblivious Transfer Reductions (Q4250752) (← links)
- Oblivious-Transfer Amplification (Q5429412) (← links)
- Adaptively secure MPC with sublinear communication complexity (Q5925696) (← links)
- Bounded Collusion ABE for TMs from IBE (Q6041291) (← links)
- IBE with incompressible master secret and small identity secrets (Q6114253) (← links)
- Bounded functional encryption for Turing machines: adaptive security from general assumptions (Q6114255) (← links)
- Cryptographic primitives with hinting property (Q6135390) (← links)
- Collusion-resistant functional encryption for RAMs (Q6135396) (← links)
- How to build a trapdoor function from an encryption scheme (Q6157550) (← links)
- Universal ring signatures in the standard model (Q6175977) (← links)
- Anonymous (hierarchical) identity-based encryption from broader assumptions (Q6535125) (← links)
- Cryptographic primitives with hinting property (Q6536746) (← links)
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces (Q6604928) (← links)
- R3PO: reach-restricted reactive program obfuscation and its applications (Q6635820) (← links)
- Laconic branching programs from the Diffie-Hellman assumption (Q6635828) (← links)
- Rate-1 fully local somewhere extractable hashing from DDH (Q6635830) (← links)
- Laconic function evaluation, functional encryption and obfuscation for RAMs with sublinear computation (Q6636505) (← links)
- Lossy cryptography from code-based assumptions (Q6652889) (← links)
- Laconic function evaluation and ABE for RAMs from (Ring-)LWE (Q6652894) (← links)
- Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices (Q6652896) (← links)