Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Breaking the Circuit Size Barrier for Secure Computation Under DDH - MaRDI portal

Breaking the Circuit Size Barrier for Secure Computation Under DDH

From MaRDI portal
Publication:2835599

DOI10.1007/978-3-662-53018-4_19zbMath1384.94038OpenAlexW2489433463MaRDI QIDQ2835599

Niv Gilboa, Yuval Ishai, Elette Boyle

Publication date: 30 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_19




Related Items (49)

Master-Key KDM-Secure IBE from PairingsEvolving homomorphic secret sharing for hierarchical access structuresLarge message homomorphic secret sharing from DCR and applicationsTwo-round MPC: information-theoretic and black-boxTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsHighly efficient OT-based multiplication protocolsSecure multiparty computation with free branchingBatch-OT with optimal rateReusable Two-Round MPC from LPNCNF-FSS and Its ApplicationsLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesSublinear-communication secure multiparty computation does not require FHEOn homomorphic secret sharing from polynomial-modulus LWEConstrained pseudorandom functions from homomorphic secret sharingSublinear secure computation from new assumptionsThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)Scooby: improved multi-party homomorphic secret sharing based on FHEHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programsAn algebraic framework for silent preprocessing with trustless setup and active securityScooby: improved multi-party homomorphic secret sharing based on FHEA framework for statistically sender private OT with optimal rateMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNCorrelation intractability and SNARGs from sub-exponential DDHMulti-client oblivious RAM with poly-logarithmic communicationLaconic private set intersection and applicationsAmortizing rate-1 OT and applications to PIR and PSINIKE from affine determinant programsHomomorphic secret sharing for low degree polynomialsFoundations of Homomorphic Secret SharingAn optimal distributed discrete log protocol with applications to homomorphic secret sharingGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationOn the local leakage resilience of linear secret sharing schemesMulti-theorem preprocessing NIZKs from latticesCompact designated verifier NIZKs from the CDH assumption without pairingsCombiners for functional encryption, unconditionallyCompact NIZKs from standard assumptions on bilinear mapsAdaptively secure MPC with sublinear communication complexityNon-interactive zero knowledge from sub-exponential DDHThe rise of Paillier: homomorphic secret sharing and public-key silent OTBreaking the circuit size barrier for secure computation under quasi-polynomial LPNFunction secret sharing for mixed-mode and fixed-point secure computationA geometric approach to homomorphic secret sharingTwo Party Distribution Testing: Communication and SecurityAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computationEfficient pseudorandom correlation generators from ring-LPNUnnamed Item


Uses Software


Cites Work


This page was built for publication: Breaking the Circuit Size Barrier for Secure Computation Under DDH