Theory of Cryptography

From MaRDI portal
Publication:5898360

DOI10.1007/11681878zbMath1112.94026OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898360

Matthias Fitzi, Jesper Buus Nielsen, Eike Kiltz, Ivan B. Damgård, Tomas Toft

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878




Related Items (37)

Efficient secure multiparty computation of sparse vector dot productsCompilation of function representations for secure computing paradigmsSecure Computation, I/O-Efficient Algorithms and Distributed SignaturesAsymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPCMultiparty Proximity Testing with Dishonest Majority from Equality Testing\( \mathsf{Rabbit} \): efficient comparison for secure multi-party computationEfficient noise generation to achieve differential privacy with applications to secure multiparty computationSecure Multi-party ShufflingPrivate liquidity matching using MPCConstant-round client-aided secure comparison protocolOur Data, Ourselves: Privacy Via Distributed Noise GenerationSecure computation with preprocessing via function secret sharingGraph coloring applied to secure computation in non-abelian groupsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionSecure two-party input-size reduction: challenges, solutions and applicationsChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextAmortizing division and exponentiationPrivacy preserving solution of DCOPs by mediation\textsf{Through the looking-glass}: benchmarking secure multi-party computation comparisons for \textsf{ReLU}'sPrivate evaluation of a decision tree based on secret sharingSelected application of the Chinese remainder theorem in multiparty computationClient-Aided Two-Party Secure Interval Test ProtocolAn efficient secure division protocol using approximate multi-bit product and new constant-round building blocksA practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationalsEfficient Binary Conversion for Paillier Encrypted ValuesDistributed Private Data Analysis: Simultaneously Solving How and WhatPrivate Database Access with HE-over-ORAM ArchitectureA note on secure multiparty computation via higher residue symbolsEfficient Secure Two-Party ExponentiationConstant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared ValuesFunction secret sharing for mixed-mode and fixed-point secure computationTrinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable ComputationGeneric Constant-Round Oblivious Sorting Algorithm for MPCTwo-server distributed ORAM with sublinear computation and constant roundsPractically Efficient Secure Single-Commodity Multi-market AuctionsImproved primitives for MPC over mixed arithmetic-binary circuitsEfficient two-party exponentiation from quotient transfer




This page was built for publication: Theory of Cryptography