Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3549593

zbMath1232.68044MaRDI QIDQ3549593

Yuval Ishai, Amit Sahai, Eyal Kushilevitz, Rafail Ostrovsky

Publication date: 5 January 2009


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (94)

Compilation of function representations for secure computing paradigmsSoK: how (not) to design and implement post-quantum cryptographyVerifiable Inner Product Encryption SchemeConcretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyUpdateable Inner Product Argument with Logarithmic Verifier and ApplicationsThree-round secure multiparty computation from black-box two-round oblivious transferOn the round complexity of black-box secure MPCAsymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCRound-optimal fully black-box zero-knowledge arguments from one-way permutationsRound optimal black-box ``commit-and-proveTowards a unified approach to black-box constructions of zero-knowledge proofsMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsEfficient Secure Multiparty Computation with Identifiable AbortBooLigero: improved sublinear zero knowledge proofs for Boolean circuitsPost-quantum key-blinding for authentication in anonymity networksMPC-in-multi-heads: a multi-prover zero-knowledge proof system (or: how to jointly prove any NP statements in ZK)A simple post-quantum non-interactive zero-knowledge proof from garbled circuitsSecret Sharing Schemes with Algebraic Properties and ApplicationsLayering quantum-resistance into classical digital signature algorithmsZK-PCPs from leakage-resilient secret sharingRound-optimal black-box protocol compilersAsymptotically quasi-optimal cryptographyZero-knowledge IOPs with linear-time prover and polylogarithmic-time verifierStacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdFrom FE combiners to secure MPC and backOn \(d\)-multiplicative secret sharingPrORAMOn interactive oracle proofs for Boolean R1CS statementsCompact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problemsBlack-box reusable NISC with random oraclesLigero: lightweight sublinear arguments without a trusted setupSok: vector OLE-based zero-knowledge protocolsOblivious sampling with applications to two-party \(k\)-means clusteringCredibility in private set membershipEfficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsShort signatures from regular syndrome decoding in the headThe return of the SDitHSyndrome decoding in the head: shorter signatures from zero-knowledge proofsEfficient NIZKs and signatures from commit-and-open protocols in the QROMVerifiable decryption in the headResumable zero-knowledge for circuits from symmetric key primitivesPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Four-round black-box non-malleable schemes from one-way permutationsEfficient NIZKs from LWE via polynomial reconstruction and ``MPC in the headOn sufficient oracles for secure computation with identifiable abortBlack-box anonymous commit-and-proveEfficient proof of RAM programs from any public-coin zero-knowledge systemNon-interactive zero-knowledge proofs to multiple verifiersMinRank in the head. Short signatures from zero-knowledge proofsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsLattice-based inner product argumentQuadratic multiparty randomized encodings beyond honest majority and their applicationsOn black-box constructions of time and space efficient sublinear arguments from symmetric-key primitivesScalable and transparent proofs over all large fields, via elliptic curves. ECFFT. IIGUC-secure commitments via random oracles: new impossibility and feasibilityManticore: a framework for efficient multiparty computation supporting real number and Boolean arithmeticHow to recover a secret with \(O(n)\) additionsPublicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-headCode-based signatures from new proofs of knowledge for the syndrome decoding problemShared permutation for syndrome decoding: new zero-knowledge protocol and code-based signatureA note on ramp secret sharing schemes from error-correcting codesAn Algebraic Approach to NonmalleabilityImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsActively secure garbled circuits with constant communication overhead in the plain modelOn the Computational Overhead of MPC with Dishonest MajoritySublinear Zero-Knowledge Arguments for RAM ProgramsOT-Combiners via Secure ComputationFrom fairness to full security in multiparty computationOn the Complexity of Additively Homomorphic UC CommitmentsRound-preserving parallel composition of probabilistic-termination cryptographic protocolsStrongly Multiplicative Ramp Schemes from High Degree Rational Points on CurvesOn the power of secure two-party computationSecurity of hedged Fiat-Shamir signatures under fault attacksSigma protocols for MQ, PKP and SIS, and fishy signature schemesStacked garbling for disjunctive zero-knowledge proofsStatistical ZAPR arguments from bilinear mapsOrder-C secure multiparty computation for highly repetitive circuitsThe more the merrier: reducing the cost of large scale MPCBanquet: short and fast signatures from AESOn publicly-accountable zero-knowledge and small shuffle argumentsOn the Power of Secure Two-Party ComputationSecure Protocol TransformationsThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsConstant-Round Interactive Proofs for Delegating ComputationBlack-box transformations from passive to covert security with public verifiabilitySpartan: efficient and general-purpose zkSNARKs without trusted setupOn Secret Sharing with Nonlinear Product ReconstructionTurboIKOS: improved non-interactive zero knowledge and post-quantum signaturesDifferential power analysis of the Picnic signature schemeZero-knowledge proofs for committed symmetric Boolean functionsThe price of active security in cryptographic protocols




This page was built for publication: