Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Efficient Non-interactive Secure Computation - MaRDI portal

Efficient Non-interactive Secure Computation

From MaRDI portal
Publication:3003395

DOI10.1007/978-3-642-20465-4_23zbMath1290.94151OpenAlexW1567505539MaRDI QIDQ3003395

Eyal Kushilevitz, Manoj Prabhakaran, Yuval Ishai, Rafail Ostrovsky, Amit Sahai

Publication date: 27 May 2011

Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_23




Related Items (43)

On the round complexity of secure quantum computationThree-round secure multiparty computation from black-box two-round oblivious transferOn the round complexity of black-box secure MPCTwo-round MPC: information-theoretic and black-boxRound optimal black-box ``commit-and-provePerfectly secure oblivious parallel RAMPattern matching on encrypted streamsConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelCryptography with One-Way CommunicationRound-Optimal Black-Box Two-Party ComputationTowards breaking the exponential barrier for general secret sharingA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementBlack-box reusable NISC with random oraclesPrivacy-preserving blueprintsPrivate polynomial commitments and applications to MPCRound-optimal oblivious transfer and MPC from computational CSIDHAuthenticated garbling from simple correlationsRound-optimal black-box secure computation from two-round malicious OTVerifiable private information retrievalThe hunting of the SNARKReusable secure computation in the plain modelCryptography from one-way communication: on completeness of finite channelsNo-Key Protocol for Deniable EncryptionDeniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic CipheringSecure quantum computation with classical communicationBlockchains enable non-interactive MPCOblivious transfer from trapdoor permutations in minimal roundsNon-interactive secure computation from one-way functionsUnnamed ItemActively secure garbled circuits with constant communication overhead in the plain modelConstant-round maliciously secure two-party computation in the RAM modelWhat security can we achieve within 4 rounds?On perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsAbuse resistant law enforcement access systemsHigh-Precision Secure Computation of Satellite Collision ProbabilitiesWhat Security Can We Achieve Within 4 Rounds?Bounded Indistinguishability and the Complexity of Recovering SecretsEfficient and tight oblivious transfer from PKE with tight multi-user securityNon-interactive Secure 2PC in the Offline/Online and Batch SettingsSuccinct non-interactive secure computation




This page was built for publication: Efficient Non-interactive Secure Computation