Theory of Cryptography
From MaRDI portal
Publication:5711647
DOI10.1007/b106171zbMath1079.94552OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711647
Anna Lysyanskaya, Susan Hohenberger
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items (26)
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration ⋮ CRT-Based Outsourcing Algorithms for Modular Exponentiations ⋮ Publicly verifiable databases with efficient insertion/deletion operations ⋮ A survey on delegated computation ⋮ Reusing nonces in Schnorr signatures (and keeping it secure...) ⋮ Secure outsourcing of modular exponentiations under single untrusted programme model ⋮ Blockchain-based system for secure outsourcing of bilinear pairings ⋮ Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem ⋮ Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme ⋮ Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT ⋮ Yao’s Millionaires’ Problem and Public-Key Encryption Without Computational Assumptions ⋮ DeCSIDH: delegating isogeny computations in the CSIDH setting ⋮ Error-Tolerant Combiners for Oblivious Primitives ⋮ Efficient and secure delegation of exponentiation in general groups to a single malicious server ⋮ Thrackles: An Improved Upper Bound ⋮ Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions ⋮ Efficient algorithms for secure outsourcing of bilinear pairings ⋮ Secure and efficient delegation of elliptic-curve pairing ⋮ How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields ⋮ Speeding up exponentiation using an untrusted computational resource ⋮ Delegating a product of group exponentiations with application to signature schemes ⋮ Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures ⋮ Comment on ``Practical and secure outsourcing algorithms for solving quadratic congruences in Internet of Things ⋮ Self-correctors for Cryptographic Modules ⋮ Outsourcing Medical Dataset Analysis: A Possible Solution ⋮ Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
This page was built for publication: Theory of Cryptography