×

Found 94 Documents (Results 1–94)

Efficient multi-party computation: from passive to active security via secure SIMD circuits. (English) Zbl 1352.94037

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 721-741 (2015).
MSC:  94A60 68P25 94C99
PDFBibTeX XMLCite
Full Text: DOI

Secure computation from leaky correlated randomness. (English) Zbl 1352.94038

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015).
MSC:  94A60 68Q87
PDFBibTeX XMLCite
Full Text: DOI

Secure computation with minimal interaction, revisited. (English) Zbl 1352.94075

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 359-378 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with one-way communication. (English) Zbl 1351.94046

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Parallel hashing via list recoverability. (English) Zbl 1351.94050

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 173-190 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Statistical randomized encodings: a complexity theoretic view. (English) Zbl 1440.68073

Halldórsson, Magnús M. (ed.) et al., Automata, languages, and programming. 42nd international colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015. Proceedings. Part I. Berlin: Springer. Lect. Notes Comput. Sci. 9134, 1-13 (2015).
MSC:  68P30 68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Function secret sharing. (English) Zbl 1371.94664

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 337-367 (2015).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Public-coin differing-inputs obfuscation and its applications. (English) Zbl 1336.94054

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 668-697 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear-time encodable codes meeting the Gilbert-Varshamov bound and their cryptographic applications. (English) Zbl 1364.94595

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 169-182 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Circuits resilient to additive attacks with applications to secure computation. (English) Zbl 1315.94073

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 495-504 (2014).
MSC:  94A60 94C12
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive secure multiparty computation. (English) Zbl 1335.94030

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 387-404 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation with identifiable abort. (English) Zbl 1335.94053

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 369-386 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the complexity of UC commitments. (English) Zbl 1328.68027

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 677-694 (2014).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the cryptographic complexity of the worst functions. (English) Zbl 1326.94072

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 317-342 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Probabilistically checkable proofs of proximity with zero-knowledge. (English) Zbl 1323.94117

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 121-145 (2014).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Lossy chains and fractional secret sharing. (English) Zbl 1354.94057

Portier, Natacha (ed.) et al., 30th international symposium on theoretical aspects of computer science, STACS’ 13, Kiel, Germany, February 27 – March 2, 2013. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-50-7). LIPIcs – Leibniz International Proceedings in Informatics 20, 160-171 (2013).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero knowledge LTCs and their applications. (English) Zbl 1405.68114

Raghavendra, Prasad (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 16th international workshop, APPROX 2013, and 17th international workshop, RANDOM 2013, Berkeley, CA, USA, August 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40327-9/pbk). Lecture Notes in Computer Science 8096, 607-622 (2013).
PDFBibTeX XMLCite
Full Text: DOI

Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract). (English) Zbl 1316.94066

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 185-202 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Encoding functions with constant online rate or how to compress garbled circuits keys. (English) Zbl 1298.94076

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 166-184 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Robust pseudorandom generators. (English) Zbl 1336.94053

Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8–12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 576-588 (2013).
MSC:  94A60 68Q25 94A55 94C10
PDFBibTeX XMLCite
Full Text: DOI

On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1381.94061

Du, Ding-Zhu (ed.) et al., Computing and combinatorics. 19th international conference, COCOON 2013, Hangzhou, China, June 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38767-8/pbk). Lecture Notes in Computer Science 7936, 169-181 (2013).
MSC:  94A60 11K45 68Q17
PDFBibTeX XMLCite
Full Text: DOI

On the power of correlated randomness in secure computation. (English) Zbl 1315.94080

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 600-620 (2013).
MSC:  94A60 68P25 68P30
PDFBibTeX XMLCite
Full Text: DOI

Succinct non-interactive arguments via linear interactive proofs. (English) Zbl 1316.68056

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 315-333 (2013).
MSC:  68Q25 68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

From randomizing polynomials to parallel algorithms. (English) Zbl 1348.94059

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 76-89 (2012).
MSC:  94A60 68Q15 68W10
PDFBibTeX XMLCite
Full Text: DOI

On efficient zero-knowledge PCPs. (English) Zbl 1304.68056

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 151-168 (2012).
MSC:  68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identifying cheaters without an honest majority. (English) Zbl 1303.94083

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 21-38 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constant-rate oblivious transfer from noisy channels. (English) Zbl 1290.94092

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 667-684 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive secure computation. (English) Zbl 1290.94151

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 406-425 (2011).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. (English) Zbl 1213.94005

Lecture Notes in Computer Science 6597. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). xii, 631 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On invertible sampling and adaptive security. (English) Zbl 1253.94052

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 466-482 (2010).
MSC:  94A60 94A20
PDFBibTeX XMLCite
Full Text: DOI

From secrecy to soundness: efficient verification via secure computation (extended abstract). (English) Zbl 1287.68041

Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6–10, 2010. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-14164-5/pbk). Lecture Notes in Computer Science 6198, 152-163 (2010).
MSC:  68Q05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure multiparty computation with minimal interaction. (English) Zbl 1283.94093

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 577-594 (2010).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Interactive locking, zero-knowledge PCPs, and unconditional cryptography. (English) Zbl 1280.94063

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 173-190 (2010).
MSC:  94A60 68T15
PDFBibTeX XMLCite
Full Text: DOI

Perfectly secure multiparty computation and the computational overhead of cryptography. (English) Zbl 1280.94046

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 445-465 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bounded key-dependent message security. (English) Zbl 1280.94038

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 423-444 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Founding cryptography on tamper-proof hardware tokens. (English) Zbl 1274.94072

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 308-326 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On complete primitives for fairness. (English) Zbl 1274.94071

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extracting correlations. (English) Zbl 1292.94080

2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 261-270 (2009).
MSC:  94A60 68Q87 68M12
PDFBibTeX XMLCite
Full Text: DOI

Secure arithmetic computation with no honest majority. (English) Zbl 1213.94111

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 294-314 (2009).
MSC:  94A60 68Q25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Founding cryptography on oblivious transfer – efficiently. (English) Zbl 1183.94037

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 572-591 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Scalable multiparty computation with nearly optimal work and resilience. (English) Zbl 1183.68082

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 241-261 (2008).
MSC:  68M12 68M14 94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication in the presence of replication. (English) Zbl 1231.68137

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 661-670 (2008).
MSC:  68Q17 94A62 94A05
PDFBibTeX XMLCite

Cryptography with constant computational overhead. (English) Zbl 1231.94050

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 433-442 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Sub-linear zero-knowledge argument for correctness of a shuffle. (English) Zbl 1149.94319

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 379-396 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

OT-combiners via secure computation. (English) Zbl 1162.94366

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 393-411 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Basing weak public-key cryptography on strong one-way functions. (English) Zbl 1162.94339

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 55-72 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How many oblivious transfers are needed for secure multiparty computation? (English) Zbl 1215.94076

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 284-302 (2007).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with constant input locality. (English) Zbl 1215.94029

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 92-110 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge from secure multiparty computation. (English) Zbl 1232.68044

STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 21-30 (2007).
PDFBibTeX XMLCite

Private multiparty sampling and approximation of vector combinations. (English) Zbl 1171.68450

Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 243-254 (2007).
MSC:  68P15 68T05 94A62
PDFBibTeX XMLCite
Full Text: DOI

Evaluating branching programs on encrypted data. (English) Zbl 1156.94354

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 575-594 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the randomness complexity of efficient sampling. (English) Zbl 1301.68261

Kleinberg, Jon M. (ed.), Proceedings of the 38th annual ACM symposium on theory of computing, STOC 2006. Seattle, WA, USA, May 21–23, 2006. New York, NY: ACM Press (ISBN 1-59593-134-1). 711-720 (2006).
PDFBibTeX XMLCite
Full Text: DOI

Black-box constructions for secure computation. (English) Zbl 1301.94116

Kleinberg, Jon M. (ed.), Proceedings of the 38th annual ACM symposium on theory of computing, STOC 2006. Seattle, WA, USA, May 21–23, 2006. New York, NY: ACM Press (ISBN 1-59593-134-1). 99-108 (2006).
PDFBibTeX XMLCite
Full Text: DOI

Private circuits. II: Keeping secrets in tamperable circuits. (English) Zbl 1140.94347

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 308-327 (2006).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

On combining privacy with guaranteed output delivery in secure multiparty computation. (English) Zbl 1161.94444

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 483-500 (2006).
MSC:  94A62 68M14
PDFBibTeX XMLCite
Full Text: DOI

Scalable secure multiparty computation. (English) Zbl 1161.94394

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 501-520 (2006).
MSC:  94A60 68M14
PDFBibTeX XMLCite
Full Text: DOI

On pseudorandom generators with linear stretch in NC\(^{0}\). (English) Zbl 1155.94363

Díaz, Josep (ed.) et al., Approximation, randomization and combinatorial optimization. Algorithms and techniques. 9th international workshop on approximation algorithms for combinatorial optimization problems, APPROX 2006, and 10th international workshop on randomization and computation, RANDOM 2006, Barcelona, Spain, August 28–30, 2006. Proceedings. Berlin: Springer (ISBN 3-540-38044-2/pbk). Lecture Notes in Computer Science 4110, 260-271 (2006).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Secure computation of constant-depth circuits with applications to database search problems. (English) Zbl 1145.68396

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 395-411 (2005).
MSC:  68P15 68M12 94A62 94C10
PDFBibTeX XMLCite
Full Text: DOI

Constant-round multiparty computation using a black-box pseudorandom generator. (English) Zbl 1145.94437

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 378-394 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Sufficient conditions for collision-resistant hashing. (English) Zbl 1079.94554

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 445-456 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Share conversion, pseudorandom secret-sharing and applications to secure computation. (English) Zbl 1079.94541

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 342-362 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Keyword search and oblivious pseudorandom functions. (English) Zbl 1079.94546

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 303-324 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the hardness of information-theoretic multiparty computation. (English) Zbl 1122.94423

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 439-455 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Communication versus computation. (English) Zbl 1099.68636

Díaz, Josep (ed.) et al., Automata, languages and programming. 31st international colloquium, ICALP 2004, Turku, Finland, July 12–16, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22849-7/pbk). Lecture Notes in Computer Science 3142, 745-756 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Private circuits: securing hardware against probing attacks. (English) Zbl 1122.94378

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 463-481 (2003).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Extending oblivious transfers efficiently. (English) Zbl 1122.94422

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 145-161 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient multi-party computation over rings. (English) Zbl 1038.94554

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 596-613 (2003).
MSC:  94A62 94A60 11T71
PDFBibTeX XMLCite
Full Text: Link

Perfect constant-round secure computation via perfect randomizing polynomials. (English) Zbl 1056.68088

Widmayer, Peter (ed.) et al., Automata, languages and programming. 29th international colloquium, ICALP 2002, Málaga, Spain, July 8–13, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43864-5). Lect. Notes Comput. Sci. 2380, 244-256 (2002).
MSC:  68Q10 94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

On 2-round secure multiparty computation. (English) Zbl 1026.94527

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 178-193 (2002).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

Selective private function evaluation with applications to private statistics. (English) Zbl 1333.94052

Proceedings of the 20th annual ACM symposium on principles of distributed computing, PODC ’01, Newport, RI, USA, August 26–28, 2001. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-383-9). 293-304 (2001).
PDFBibTeX XMLCite
Full Text: DOI

The round complexity of verifiable secret sharing and secure multicast. (English) Zbl 1317.68072

Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 580-589 (2001).
MSC:  68Q25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On adaptive vs. non-adaptive security of multiparty protocols. (English) Zbl 0981.94040

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 262-279 (2001).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Priced oblivious transfer: how to sell digital goods. (English) Zbl 0981.94042

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 119-135 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Software