Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
From MaRDI portal
Publication:4911582
DOI10.1007/978-3-642-34961-4_10zbMath1292.94027OpenAlexW2111276172MaRDI QIDQ4911582
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
Publication date: 19 March 2013
Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_10
Related Items (26)
Limits on the adaptive security of Yao's garbling ⋮ One-Time Programs with Limited Memory ⋮ Adaptive Security of Yao’s Garbled Circuits ⋮ Adaptive Succinct Garbled RAM or: How to Delegate Your Database ⋮ Adaptive security of practical garbling schemes ⋮ Unclonable polymers and their cryptographic applications ⋮ Distributed (correlation) samplers: how to remove a trusted dealer in one round ⋮ Adaptively secure computation for RAM programs ⋮ Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings ⋮ Storing and Retrieving Secrets on a Blockchain ⋮ Adaptively secure garbling schemes for parallel computations ⋮ Minimizing setup in broadcast-optimal two round MPC ⋮ Reactive Garbling: Foundation, Instantiation, Application ⋮ Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys ⋮ Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract) ⋮ One-time programs from commodity hardware ⋮ (Public) verifiability for composable protocols without adaptivity or zero-knowledge ⋮ Blockchains enable non-interactive MPC ⋮ On treewidth, separators and Yao's garbling ⋮ The cost of adaptivity in security games on graphs ⋮ Functional Encryption for Turing Machines ⋮ High-Precision Secure Computation of Satellite Collision Probabilities ⋮ Adaptively Secure Garbled Circuits from One-Way Functions ⋮ Garbled Circuits as Randomized Encodings of Functions: a Primer ⋮ Non-interactive Secure 2PC in the Offline/Online and Batch Settings ⋮ Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
This page was built for publication: Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing