Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On Robust Combiners for Oblivious Transfer and Other Primitives - MaRDI portal

On Robust Combiners for Oblivious Transfer and Other Primitives

From MaRDI portal
Publication:5385724

DOI10.1007/11426639_6zbMath1137.94346OpenAlexW2164987725MaRDI QIDQ5385724

Alon Rosen, Moni Naor, Danny Harnik, Joe Kilian, Omer Reingold

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_6




Related Items

Three-round secure multiparty computation from black-box two-round oblivious transferSecure computation using leaky correlations (asymptotically optimal constructions)Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key AgreementSecure Computation from Leaky Correlated RandomnessProofs of Work from worst-case assumptionsA complete one-way function based on a finite rank free \(\mathbb{Z}\times\mathbb{Z}\)-moduleFrom FE combiners to secure MPC and backVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeRandom oracle combiners: breaking the concatenation barrier for collision-resistanceOne-time programs from commodity hardwareList oblivious transfer and applications to round-optimal black-box multiparty coin tossingFeebly secure cryptographic primitivesCircuit complexity of linear functions: gate elimination and feeble securityError-Tolerant Combiners for Oblivious PrimitivesStructural complexity of AvgBPPOblivious transfer from trapdoor permutations in minimal roundsGate Elimination for Linear Functions and New Feebly Secure ConstructionsOn optimal heuristic randomized semidecision procedures, with applications to proof complexity and cryptographyThe complexity of explicit constructionsOn the complexity of compressing obfuscationCompression from Collisions, or Why CRHF Combiners Have a Long OutputMulti-property Preserving Combiners for Hash FunctionsOT-Combiners via Secure ComputationOn complete one-way functionsHigh-performance multi-party computation for binary circuits based on oblivious transferAlgebraic cryptography: new constructions and their security against provable breakRobust multi-property combiners for hash functionsCombiners for Chosen-Ciphertext SecurityCombiners for functional encryption, unconditionallyLeakage-resilience of the Shamir secret-sharing scheme against physical-bit leakagesA Feebly Secure Trapdoor FunctionStructural Complexity of AvgBPPNetwork Oblivious TransferUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionObfuscation CombinersAuthenticated Byzantine Generals in Dual Failure ModelOn Complete Primitives for Fairness