Adaptive Succinct Garbled RAM or: How to Delegate Your Database
From MaRDI portal
Publication:3181022
DOI10.1007/978-3-662-53644-5_3zbMath1397.94052OpenAlexW2532800474MaRDI QIDQ3181022
Ran Canetti, Justin Holmgren, Mariana Raykova, Yilei Chen
Publication date: 22 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_3
Related Items (14)
Succinct garbling schemes from functional encryption through a local simulation paradigm ⋮ Delegating RAM Computations with Adaptive Soundness and Privacy ⋮ Adaptive Succinct Garbled RAM or: How to Delegate Your Database ⋮ Delegating RAM Computations ⋮ \textsc{EpiGRAM}: practical garbled RAM ⋮ Adaptively secure garbling schemes for parallel computations ⋮ On the optimal succinctness and efficiency of functional encryption and attribute-based encryption ⋮ Collusion-resistant functional encryption for RAMs ⋮ NanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overhead ⋮ Tri-state circuits. A circuit model that captures RAM ⋮ No-signaling linear PCPs ⋮ No-signaling linear PCPs ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
Uses Software
Cites Work
- Unnamed Item
- The hunting of the SNARK
- Fully Succinct Garbled RAM
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
- Adaptively Secure Garbled Circuits from One-Way Functions
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
- Succinct Garbling and Indistinguishability Obfuscation for RAM Programs
- Succinct Randomized Encodings and their Applications
- Garbled RAM From One-Way Functions
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Adaptive Succinct Garbled RAM or: How to Delegate Your Database
- Delegating RAM Computations
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Improved Delegation of Computation Using Fully Homomorphic Encryption
- One-Time Programs
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Software protection and simulation on oblivious RAMs
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- How to Garble RAM Programs?
- Optimal Verification of Operations on Dynamic Sets
- How to delegate computations
- Garbled RAM Revisited
- On Extractability Obfuscation
This page was built for publication: Adaptive Succinct Garbled RAM or: How to Delegate Your Database