CNF-FSS and its Applications
暂无分享,去创建一个
[1] Ariel Hamlin,et al. Two-server Distributed ORAM with Sublinear Computation and Constant Rounds , 2020, IACR Cryptol. ePrint Arch..
[2] Abhi Shelat,et al. Scaling ORAM for Secure Computation , 2017, IACR Cryptol. ePrint Arch..
[3] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[4] Klim Efremenko,et al. 3-Query Locally Decodable Codes of Subexponential Length , 2008 .
[5] Dan Boneh,et al. Key Homomorphic PRFs and Their Applications , 2013, CRYPTO.
[6] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[7] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[8] Rafail Ostrovsky,et al. DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls , 2019, WPES@CCS.
[9] Yehuda Lindell,et al. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority , 2017, IACR Cryptol. ePrint Arch..
[10] Yuval Ishai,et al. Breaking the Circuit Size Barrier for Secure Computation Under DDH , 2016, CRYPTO.
[11] Jonathan Katz,et al. Simple and Efficient Two-Server ORAM , 2018, IACR Cryptol. ePrint Arch..
[12] Rafail Ostrovsky,et al. Universal service-providers for database private information retrieval (extended abstract) , 1998, PODC '98.
[13] Yuval Ishai,et al. On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR , 2007, APPROX-RANDOM.
[14] Yuval Ishai,et al. Compressing Cryptographic Resources , 1999, CRYPTO.
[15] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[16] Rafail Ostrovsky,et al. Efficient 3-Party Distributed ORAM , 2018, IACR Cryptol. ePrint Arch..
[17] Dan Boneh,et al. Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] Jonathan Katz,et al. Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[19] Anat Paskin-Cherniavsky,et al. Secure Computation with Minimal Interaction, Revisited , 2015, CRYPTO.
[20] Rafail Ostrovsky,et al. Private Large-Scale Databases with Distributed Searchable Symmetric Encryption , 2016, CT-RSA.
[21] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[22] Yuval Ishai,et al. Efficient Pseudorandom Correlation Generators: Silent OT Extension and More , 2019, IACR Cryptol. ePrint Arch..
[23] Stanislaw Jarecki,et al. 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval , 2018, IACR Cryptol. ePrint Arch..
[24] Rafail Ostrovsky,et al. Private Information Storage , 1996, IACR Cryptol. ePrint Arch..
[25] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[26] Ron Rothblum,et al. Spooky Encryption and Its Applications , 2016, CRYPTO.
[27] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[28] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[29] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[30] Dan Boneh,et al. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy , 2021, USENIX Security Symposium.
[31] Yuval Ishai,et al. Distributed Point Functions and Their Applications , 2014, EUROCRYPT.
[32] Yuval Ishai,et al. Foundations of Homomorphic Secret Sharing , 2018, ITCS.
[33] Eyal Kushilevitz,et al. Sub-logarithmic Distributed Oblivious RAM with Small Block Size , 2019, IACR Cryptol. ePrint Arch..
[34] Benny Pinkas,et al. Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast , 2020, IACR Cryptol. ePrint Arch..
[35] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.