Theory of Cryptography

From MaRDI portal
Publication:5711647

DOI10.1007/b106171zbMath1079.94552OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711647

Anna Lysyanskaya, Susan Hohenberger

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b106171




Related Items (26)

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationCRT-Based Outsourcing Algorithms for Modular ExponentiationsPublicly verifiable databases with efficient insertion/deletion operationsA survey on delegated computationReusing nonces in Schnorr signatures (and keeping it secure...)Secure outsourcing of modular exponentiations under single untrusted programme modelBlockchain-based system for secure outsourcing of bilinear pairingsCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing schemeHide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRTYao’s Millionaires’ Problem and Public-Key Encryption Without Computational AssumptionsDeCSIDH: delegating isogeny computations in the CSIDH settingError-Tolerant Combiners for Oblivious PrimitivesEfficient and secure delegation of exponentiation in general groups to a single malicious serverThrackles: An Improved Upper BoundPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsEfficient algorithms for secure outsourcing of bilinear pairingsSecure and efficient delegation of elliptic-curve pairingHow to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fieldsSpeeding up exponentiation using an untrusted computational resourceDelegating a product of group exponentiations with application to signature schemesLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresComment on ``Practical and secure outsourcing algorithms for solving quadratic congruences in Internet of ThingsSelf-correctors for Cryptographic ModulesOutsourcing Medical Dataset Analysis: A Possible SolutionDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications






This page was built for publication: Theory of Cryptography