An algebraic framework for silent preprocessing with trustless setup and active security
From MaRDI portal
Publication:6166960
DOI10.1007/978-3-031-15985-5_15zbMath1517.94045MaRDI QIDQ6166960
Damiano Abram, Ivan B. Damgård, Peter Scholl, Claudio Orlandi
Publication date: 7 July 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Related Items (8)
New ways to garble arithmetic circuits ⋮ Sublinear-communication secure multiparty computation does not require FHE ⋮ Constrained pseudorandom functions from homomorphic secret sharing ⋮ I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups ⋮ Sublinear secure computation from new assumptions ⋮ Scooby: improved multi-party homomorphic secret sharing based on FHE ⋮ Secure multiparty computation from threshold encryption based on class groups ⋮ Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new public-key cryptosystem over a quadratic order with quadratic decryption time.
- The rise of Paillier: homomorphic secret sharing and public-key silent OT
- Efficient range proofs with transparent setup from bounded integer commitments
- Large message homomorphic secret sharing from DCR and applications
- Efficient noninteractive certification of RSA moduli and beyond
- Homomorphic secret sharing from lattices without FHE
- Efficient pseudorandom correlation generators: silent OT extension and more
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- Linearly Homomorphic Encryption from $$\mathsf {DDH}$$
- Breaking the Circuit Size Barrier for Secure Computation Under DDH
- Non-interactive Zero-Knowledge Arguments for Voting
- Founding Cryptography on Oblivious Transfer – Efficiently
- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
- Efficient Cryptosystems from 2 k -th Power Residue Symbols
This page was built for publication: An algebraic framework for silent preprocessing with trustless setup and active security