Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram Round-optimal black-box protocol compilers. (English) Zbl 1499.68118 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 210-240 (2022). MSC: 68Q10 68N20 94A60 PDF BibTeX XML Cite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 13275, 210--240 (2022; Zbl 1499.68118) Full Text: DOI OpenURL
Magri, Bernardo; Malavolta, Giulio; Schröder, Dominique; Unruh, Dominique Everlasting UC commitments from fully malicious PUFs. (English) Zbl 1492.94146 J. Cryptology 35, No. 3, Paper No. 20, 39 p. (2022). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{B. Magri} et al., J. Cryptology 35, No. 3, Paper No. 20, 39 p. (2022; Zbl 1492.94146) Full Text: DOI OpenURL
Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram On the round complexity of black-box secure MPC. (English) Zbl 1486.94111 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021). MSC: 94A60 68M12 68M14 PDF BibTeX XML Cite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 12826, 214--243 (2021; Zbl 1486.94111) Full Text: DOI OpenURL
Grilo, Alex B.; Lin, Huijia; Song, Fang; Vaikuntanathan, Vinod Oblivious transfer is in MiniQCrypt. (English) Zbl 1479.94182 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 531-561 (2021). MSC: 94A60 81P45 81P94 PDF BibTeX XML Cite \textit{A. B. Grilo} et al., Lect. Notes Comput. Sci. 12697, 531--561 (2021; Zbl 1479.94182) Full Text: DOI arXiv OpenURL
Alon, Bar; Paskin-Cherniavsky, Anat On perfectly secure 2PC in the OT-hybrid model. (English) Zbl 07412748 Theor. Comput. Sci. 891, 166-188 (2021). MSC: 68Qxx PDF BibTeX XML Cite \textit{B. Alon} and \textit{A. Paskin-Cherniavsky}, Theor. Comput. Sci. 891, 166--188 (2021; Zbl 07412748) Full Text: DOI OpenURL
Orsini, Emmanuela Efficient, actively secure MPC with a dishonest majority: a survey. (English) Zbl 07405934 Bajard, Jean Claude (ed.) et al., Arithmetic of finite fields. 8th international workshop, WAIFI 2020, Rennes, France, July 6–8, 2020. Revised selected and invited papers. Cham: Springer. Lect. Notes Comput. Sci. 12542, 42-71 (2021). MSC: 68P25 68Mxx 94A60 11T71 PDF BibTeX XML Cite \textit{E. Orsini}, Lect. Notes Comput. Sci. 12542, 42--71 (2021; Zbl 07405934) Full Text: DOI OpenURL
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. High-performance multi-party computation for binary circuits based on oblivious transfer. (English) Zbl 1470.94080 J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. S. Burra} et al., J. Cryptology 34, No. 3, Paper No. 34, 87 p. (2021; Zbl 1470.94080) Full Text: DOI Link OpenURL
Canetti, Ran; Sarkar, Pratik; Wang, Xiao Blazing fast OT for three-round UC OT extension. (English) Zbl 07436976 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 299-327 (2020). MSC: 68P25 68Mxx 94A60 PDF BibTeX XML Cite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 12111, 299--327 (2020; Zbl 07436976) Full Text: DOI OpenURL
Chongchitmate, Wutichai; Ostrovsky, Rafail Information-theoretic broadcast with dishonest majority for long messages. (English) Zbl 1443.94050 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 370-388 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Chongchitmate} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 11239, 370--388 (2018; Zbl 1443.94050) Full Text: DOI OpenURL
Garg, Sanjam; Ishai, Yuval; Srinivasan, Akshayaram Two-round MPC: information-theoretic and black-box. (English) Zbl 1443.94058 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 123-151 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11239, 123--151 (2018; Zbl 1443.94058) Full Text: DOI OpenURL
Lindell, Yehuda; Zarosim, Hila On the feasibility of extending oblivious transfer. (English) Zbl 1400.94164 J. Cryptology 31, No. 3, 737-773 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Lindell} and \textit{H. Zarosim}, J. Cryptology 31, No. 3, 737--773 (2018; Zbl 1400.94164) Full Text: DOI Link OpenURL
Fujisaki, Eiichiro All-but-many encryption. (English) Zbl 1426.94100 J. Cryptology 31, No. 1, 226-275 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Fujisaki}, J. Cryptology 31, No. 1, 226--275 (2018; Zbl 1426.94100) Full Text: DOI OpenURL
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael More efficient oblivious transfer extensions. (English) Zbl 1377.94030 J. Cryptology 30, No. 3, 805-858 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Asharov} et al., J. Cryptology 30, No. 3, 805--858 (2017; Zbl 1377.94030) Full Text: DOI Link OpenURL
Rindal, Peter; Rosulek, Mike Improved private set intersection against malicious adversaries. (English) Zbl 1411.94085 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 235-259 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Rindal} and \textit{M. Rosulek}, Lect. Notes Comput. Sci. 10210, 235--259 (2017; Zbl 1411.94085) Full Text: DOI OpenURL
Orrù, Michele; Orsini, Emmanuela; Scholl, Peter Actively secure 1-out-of-\(N\) OT extension with application to private set intersection. (English) Zbl 1383.94036 Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 381-396 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Orrù} et al., Lect. Notes Comput. Sci. 10159, 381--396 (2017; Zbl 1383.94036) Full Text: DOI OpenURL
Garg, Sanjam; Gupta, Divya; Miao, Peihan; Pandey, Omkant Secure multiparty RAM computation in constant rounds. (English) Zbl 1406.94055 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 491-520 (2016). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 9985, 491--520 (2016; Zbl 1406.94055) Full Text: DOI OpenURL
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan On the power of secure two-party computation. (English) Zbl 1372.94429 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 397-429 (2016). MSC: 94A60 68P25 68M12 PDF BibTeX XML Cite \textit{C. Hazay} and \textit{M. Venkitasubramaniam}, Lect. Notes Comput. Sci. 9815, 397--429 (2016; Zbl 1372.94429) Full Text: DOI OpenURL
Kumaresan, Ranjit; Raghuraman, Srinivasan; Sealfon, Adam Network oblivious transfer. (English) Zbl 1391.94772 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 366-396 (2016). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{R. Kumaresan} et al., Lect. Notes Comput. Sci. 9815, 366--396 (2016; Zbl 1391.94772) Full Text: DOI OpenURL
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto On the complexity of additively homomorphic UC commitments. (English) Zbl 1388.94055 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 542-565 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{T. K. Frederiksen} et al., Lect. Notes Comput. Sci. 9562, 542--565 (2016; Zbl 1388.94055) Full Text: DOI OpenURL
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay Founding cryptography on tamper-proof hardware tokens. (English) Zbl 1274.94072 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 308-326 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 5978, 308--326 (2010; Zbl 1274.94072) Full Text: DOI OpenURL
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit On complete primitives for fairness. (English) Zbl 1274.94071 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Gordon} et al., Lect. Notes Comput. Sci. 5978, 91--108 (2010; Zbl 1274.94071) Full Text: DOI OpenURL
Lindell, Yehuda; Pinkas, Benny A proof of security of Yao’s protocol for two-party computation. (English) Zbl 1159.94364 J. Cryptology 22, No. 2, 161-188 (2009). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Lindell} and \textit{B. Pinkas}, J. Cryptology 22, No. 2, 161--188 (2009; Zbl 1159.94364) Full Text: DOI OpenURL