Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Founding Cryptography on Oblivious Transfer – Efficiently - MaRDI portal

Founding Cryptography on Oblivious Transfer – Efficiently

From MaRDI portal
Publication:3600241

DOI10.1007/978-3-540-85174-5_32zbMath1183.94037OpenAlexW1560201081WikidataQ29393432 ScholiaQ29393432MaRDI QIDQ3600241

Yuval Ishai, Manoj Prabhakaran, Amit Sahai

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_32




Related Items (only showing first 100 items - show all)

One-way functions imply secure computation in a quantum worldThree-round secure multiparty computation from black-box two-round oblivious transferOn the round complexity of black-box secure MPCFast cut-and-choose-based protocols for malicious and covert adversariesTwo-round MPC: information-theoretic and black-boxRound optimal black-box ``commit-and-proveOblivious transfer in incomplete networksSecure computation using leaky correlations (asymptotically optimal constructions)On the structure of unconditional UC hybrid protocolsTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeTowards a unified approach to black-box constructions of zero-knowledge proofsBinary AMD Circuits from Secure Multiparty ComputationComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsSecure Multiparty RAM Computation in Constant RoundsConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelMore Efficient Constant-Round Multi-party Computation from BMR and SHECryptography with One-Way CommunicationRound-Optimal Black-Box Two-Party ComputationSecure Computation from Leaky Correlated RandomnessEfficient Multi-party Computation: From Passive to Active Security via Secure SIMD CircuitsIncoercible Multi-party Computation and Universally Composable Receipt-Free VotingActively Secure OT Extension with Optimal OverheadMPC-in-multi-heads: a multi-prover zero-knowledge proof system (or: how to jointly prove any NP statements in ZK)Secure multiparty computation in the bounded storage modelAn improved affine equivalence algorithm for random permutationsSecret Sharing Schemes with Algebraic Properties and ApplicationsRound-optimal and communication-efficient multiparty computationRound-optimal black-box protocol compilersGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsAsymptotically quasi-optimal cryptographyRound-optimal multi-party computation with identifiable abortIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Secure non-interactive reduction and spectral analysis of correlationsAlgebraic geometric secret sharing schemes over large fields are asymptotically thresholdFeasibility and infeasibility of secure computation with malicious PUFsA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementOn \(d\)-multiplicative secret sharingMore efficient oblivious transfer extensionsSecure two-party computation via cut-and-choose oblivious transferGeneralizing Efficient Multiparty ComputationReactive Garbling: Foundation, Instantiation, ApplicationEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Secure quantum computation with classical communicationOn actively-secure elementary MPC reductionsEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsSecure computation with low communication from cross-checkingRound-efficient black-box construction of composable multi-party computationA note on ramp secret sharing schemes from error-correcting codesMulti-party computation with conversion of secret sharingEfficient, actively secure MPC with a dishonest majority: a surveyAll-but-many encryptionEfficient one-sided adaptively secure computationConstruction of arithmetic secret sharing schemes by using torsion limitsEverlasting multi-party computationOblivious polynomial evaluation and secure set-intersection from algebraic PRFsComputing boundary cycle of a pseudo-triangle polygon from its visibility graphEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSOn the Computational Overhead of MPC with Dishonest MajorityConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelScalable Multi-party Private Set-IntersectionRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionConstant-round maliciously secure two-party computation in the RAM modelQuantum cryptographyYet another compiler for active security or: efficient MPC over arbitrary ringsFrom fairness to full security in multiparty computationOn the Complexity of Additively Homomorphic UC CommitmentsOn the exact round complexity of secure three-party computationRound-preserving parallel composition of probabilistic-termination cryptographic protocolsEfficient Secure Two-Party ExponentiationHigh-performance multi-party computation for binary circuits based on oblivious transferOn perfectly secure 2PC in the OT-hybrid modelOn the power of secure two-party computationCombiners for functional encryption, unconditionallyGoing beyond dual execution: MPC for functions with efficient verificationOblivious transfer is in MiniQCryptGeneric compiler for publicly verifiable covert multi-party computationFunction secret sharing for mixed-mode and fixed-point secure computationAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsOn Adaptively Secure Multiparty Computation with a Short CRSNetwork Oblivious TransferOn the Power of Secure Two-Party ComputationSecure Protocol TransformationsRate-1, Linear Time and Additively Homomorphic UC CommitmentsProbabilistic Termination and Composability of Cryptographic ProtocolsOn black-box complexity of universally composable security in the CRS modelProbabilistic termination and composability of cryptographic protocolsEfficient constant-round multi-party computation combining BMR and SPDZOn Complete Primitives for FairnessOn the Necessary and Sufficient Assumptions for UC ComputationFounding Cryptography on Tamper-Proof Hardware TokensEfficient pseudorandom correlation generators from ring-LPNEfficient constant-round MPC with identifiable abort and public verifiabilityBlack-box transformations from passive to covert security with public verifiabilityEfficient and tight oblivious transfer from PKE with tight multi-user securityNon-interactive Secure 2PC in the Offline/Online and Batch SettingsEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain ModelThe price of active security in cryptographic protocols




This page was built for publication: Founding Cryptography on Oblivious Transfer – Efficiently