Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing - MaRDI portal

Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing

From MaRDI portal
Publication:4911582

DOI10.1007/978-3-642-34961-4_10zbMath1292.94027OpenAlexW2111276172MaRDI QIDQ4911582

Mihir Bellare, Viet Tung Hoang, Phillip Rogaway

Publication date: 19 March 2013

Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_10




Related Items (26)

Limits on the adaptive security of Yao's garblingOne-Time Programs with Limited MemoryAdaptive Security of Yao’s Garbled CircuitsAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseAdaptive security of practical garbling schemesUnclonable polymers and their cryptographic applicationsDistributed (correlation) samplers: how to remove a trusted dealer in one roundAdaptively secure computation for RAM programsIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsStoring and Retrieving Secrets on a BlockchainAdaptively secure garbling schemes for parallel computationsMinimizing setup in broadcast-optimal two round MPCReactive Garbling: Foundation, Instantiation, ApplicationEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysRound-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)One-time programs from commodity hardware(Public) verifiability for composable protocols without adaptivity or zero-knowledgeBlockchains enable non-interactive MPCOn treewidth, separators and Yao's garblingThe cost of adaptivity in security games on graphsFunctional Encryption for Turing MachinesHigh-Precision Secure Computation of Satellite Collision ProbabilitiesAdaptively Secure Garbled Circuits from One-Way FunctionsGarbled Circuits as Randomized Encodings of Functions: a PrimerNon-interactive Secure 2PC in the Offline/Online and Batch SettingsEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model




This page was built for publication: Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing