Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3549728

zbMath1231.94050MaRDI QIDQ3549728

Eyal Kushilevitz, Amit Sahai, Yuval Ishai, Rafail Ostrovsky

Publication date: 5 January 2009


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (45)

On the Complexity of Random Satisfiability Problems with Planted SolutionsSilver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codesExploring crypto dark matter: new simple PRF candidates and their applicationsAn efficient structural attack on NIST submission DAGSQuantum algorithms for the \(k\)-XOR problemLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ A dichotomy for local small-bias generatorsFast Pseudorandom Functions Based on Expander GraphsBinary AMD Circuits from Secure Multiparty ComputationCryptographic hardness of random local functions. SurveyAsymptotically quasi-optimal cryptographyLocally computable UOWHF with linear shrinkageMore efficient oblivious transfer extensionsImproved filter permutators for efficient FHE: better instances and implementationsActively secure arithmetic computation and VOLE with constant computational overheadLigero: lightweight sublinear arguments without a trusted setupEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysSampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible ErrorOn the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generatorPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundNon-interactive secure computation of inner-product from LPN and LWEWorst-case subexponential attacks on PRGs of constant degree or constant localityOblivious transfer with constant computational overheadFaster sounder succinct arguments and \textsf{IOP}sAlgebraic Attacks against Random Local Functions and Their CountermeasuresHow to recover a secret with \(O(n)\) additionsA framework for statistically sender private OT with optimal rateMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNPublicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-headIndistinguishability obfuscation\texttt{MOTIF}: (almost) free branching in GMW. Via vector-scalar multiplicationComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Simple and more efficient PRFs with tight security from LWE and matrix-DDHActively secure garbled circuits with constant communication overhead in the plain modelGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationHigh-performance multi-party computation for binary circuits based on oblivious transferOn perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelOn linear-size pseudorandom generators and hardcore functionsVerifiable random functions with optimal tightnessRate-1, Linear Time and Additively Homomorphic UC CommitmentsUnnamed ItemPseudorandom Functions: Three Decades LaterHomomorphic EncryptionTurboIKOS: improved non-interactive zero knowledge and post-quantum signatures




This page was built for publication: