Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Distributed Point Functions and Their Applications - MaRDI portal

Distributed Point Functions and Their Applications

From MaRDI portal
Publication:5418720

DOI10.1007/978-3-642-55220-5_35zbMath1328.68054OpenAlexW139740867WikidataQ63090561 ScholiaQ63090561MaRDI QIDQ5418720

Yuval Ishai, Niv Gilboa

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_35




Related Items (36)

Tweakable block ciphers secure beyond the birthday bound in the ideal cipher modelTargeted lossy functions and applicationsFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsLightweight, maliciously secure verifiable function secret sharingSingle-server private information retrieval with sublinear amortized timeReusable Two-Round MPC from LPNLow-Communication Multiparty Triple Generation for SPDZ from Ring-LPNCNF-FSS and Its ApplicationsSecure computation with preprocessing via function secret sharingMPCCache: privacy-preserving multi-party cooperative cache sharing at the edgeSublinear-communication secure multiparty computation does not require FHEOn homomorphic secret sharing from polynomial-modulus LWEPseudorandom correlation functions from variable-density LPN, revisitedPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessProgrammable distributed point functions3-party distributed ORAM from oblivious set membershipScooby: improved multi-party homomorphic secret sharing based on FHEStreaming and unbalanced PSI from function secret sharingOblivious transfer with constant computational overheadOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingScooby: improved multi-party homomorphic secret sharing based on FHEHalf-tree: halving the cost of tree expansion in COT and DPFMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNMulti-client oblivious RAM with poly-logarithmic communicationHomomorphic secret sharing for low degree polynomialsFoundations of Homomorphic Secret SharingConstraining Pseudorandom Functions PrivatelyPrivate Puncturable PRFs from Standard Lattice AssumptionsPrivate information retrieval with sublinear online timeThe rise of Paillier: homomorphic secret sharing and public-key silent OTBreaking the circuit size barrier for secure computation under quasi-polynomial LPNSpooky Encryption and Its ApplicationsAdaptively Secure Garbled Circuits from One-Way FunctionsBreaking the Circuit Size Barrier for Secure Computation Under DDHEfficient pseudorandom correlation generators from ring-LPN




This page was built for publication: Distributed Point Functions and Their Applications