Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On the Cryptographic Complexity of the Worst Functions - MaRDI portal

On the Cryptographic Complexity of the Worst Functions

From MaRDI portal
Publication:5746343

DOI10.1007/978-3-642-54242-8_14zbMath1326.94072OpenAlexW2201666892MaRDI QIDQ5746343

Yuval Ishai, Eyal Kushilevitz, Amos Beimel, Ranjit Kumaresan

Publication date: 18 February 2014

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-54242-8_14




Related Items (26)

Secret-sharing schemes for very dense graphsOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateMeasuring, simulating and exploiting the head concavity phenomenon in BKZSecure Computation with Minimal Interaction, RevisitedCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionTowards breaking the exponential barrier for general secret sharingSecure non-interactive simulation: feasibility and rateSecure non-interactive reduction and spectral analysis of correlationsPrivate simultaneous messages based on quadratic residuesSecure non-interactive simulation from arbitrary joint distributionsSecure non-interactive reducibility is decidableOblivious-transfer complexity of noisy coin-toss via secure zero communication reductionsFrom private simultaneous messages to zero-information Arthur-Merlin protocols and backMulti-party PSM, revisited: improved communication and unbalanced communicationOptimal linear multiparty conditional disclosure of secrets protocolsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionUnnamed ItemThe communication complexity of private simultaneous messages, revisitedFrom Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and BackPlacing conditional disclosure of secrets in the communication complexity universeA geometric approach to homomorphic secret sharingSecret Sharing Schemes for Dense Forbidden GraphsGarbled Circuits as Randomized Encodings of Functions: a PrimerSome Open Problems in Information-Theoretic Cryptography






This page was built for publication: On the Cryptographic Complexity of the Worst Functions