Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Two-Party Computation with Low Communication - MaRDI portal

Secure Two-Party Computation with Low Communication

From MaRDI portal
Publication:2891476

DOI10.1007/978-3-642-28914-9_4zbMath1303.94076OpenAlexW174102541MaRDI QIDQ2891476

Carmit Hazay, Sebastian Faust, Ivan B. Damgård

Publication date: 15 June 2012

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_4




Related Items (31)

Toward RSA-OAEP Without Random OraclesSuccinct non-interactive arguments via linear interactive proofsNon-interactive batch arguments for NP from standard assumptionsArguments of ProximityDelegating RAM ComputationsSNARGs for P from sub-exponential DDH and QRIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsOn the Bottleneck Complexity of MPC with Correlated RandomnessRefereed delegation of computationOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionPhysical zero-knowledge proof and NP-completeness proof of Suguru puzzleSublinear-communication secure multiparty computation does not require FHENon-interactive publicly-verifiable delegation of committed programsBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsSublinear secure computation from new assumptionsUnnamed ItemFully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationThe hunting of the SNARKNon-interactive zero-knowledge from non-interactive batch argumentsNo-signaling linear PCPsCommunication Optimal Tardos-Based Asymmetric FingerprintingCryptographic Assumptions: A Position PaperNo-signaling linear PCPsRational SumchecksWitness indistinguishability for any single-round argument with applications to access controlBreaking the circuit size barrier for secure computation under quasi-polynomial LPNThe Feasibility of Outsourced Database Search in the Plain ModelOn the Existence of Extractable One-Way FunctionsConstant-Round Interactive Proofs for Delegating ComputationLattice-Based SNARGs and Their Application to More Efficient Obfuscation




This page was built for publication: Secure Two-Party Computation with Low Communication