Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Non-Interactive Secure Multiparty Computation - MaRDI portal

Non-Interactive Secure Multiparty Computation

From MaRDI portal
Publication:2874549

DOI10.1007/978-3-662-44381-1_22zbMath1335.94030OpenAlexW117166206MaRDI QIDQ2874549

Yuval Ishai, Eyal Kushilevitz, Amos Beimel, Ariel Gabizon, Sigurd Meldgaard, Anat Paskin-Cherniavsky

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_22




Related Items (24)

Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensionsBest possible information-theoretic MPCSurvey of information securityConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsOn the (in)efficiency of non-interactive secure multiparty computationDistributed (correlation) samplers: how to remove a trusted dealer in one roundOn the Bottleneck Complexity of MPC with Correlated RandomnessOn fully secure MPC with solitary outputIs information-theoretic topology-hiding computation possible?Multi-key and multi-input predicate encryption from learning with errorsPrivate simultaneous messages based on quadratic residuesMulti-input Functional Encryption with Unbounded-Message SecurityHow to obfuscate MPC inputsTowards practical topology-hiding computationAdditive randomized encodings and their applicationsBlockchains enable non-interactive MPCBrief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPCTopology-hiding computation on all graphsMulti-input Functional Encryption and Its Application in Outsourcing ComputationMultiparty reusable non-interactive secure computation from LWEThreshold garbled circuits and ad hoc secure computationOn cryptographic anonymity and unpredictability in secret sharingAd Hoc PSM Protocols: Secure Computation Without CoordinationTopology-Hiding Computation Beyond Logarithmic Diameter






This page was built for publication: Non-Interactive Secure Multiparty Computation