Secure Arithmetic Computation with Constant Computational Overhead
暂无分享,去创建一个
Yuval Ishai | Ivan Damgård | Benny Applebaum | Michael Nielsen | Lior Zichron | I. Damgård | Y. Ishai | B. Applebaum | Michael Nielsen | Lior Zichron
[1] Elchanan Mossel,et al. On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.
[2] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[3] Donald Beaver,et al. Correlated pseudorandomness and the complexity of private computations , 1996, STOC '96.
[4] Michael Alekhnovich. More on Average Case vs Approximation Complexity , 2011, computational complexity.
[5] Avi Wigderson,et al. Public-key cryptography from different assumptions , 2010, STOC '10.
[6] Ryan O'Donnell,et al. Sum of squares lower bounds for refuting any CSP , 2017, STOC.
[7] Benny Applebaum,et al. Pseudorandom generators with long stretch and low locality from random local one-way functions , 2012, STOC '12.
[8] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[9] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[10] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[11] Oded Goldreich,et al. Candidate One-Way Functions Based on Expander Graphs , 2000, Studies in Complexity and Cryptography.
[12] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[13] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, APPROX-RANDOM.
[14] Yuval Ishai,et al. Cryptography in NC0 , 2004, SIAM J. Comput..
[15] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[16] Silvio Micali,et al. How to play any mental game, or a completeness theorem for protocols with honest majority , 2019, Providing Sound Foundations for Cryptography.
[17] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[18] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[19] Luca Trevisan,et al. On epsilon-Biased Generators in NC0 , 2003, Electron. Colloquium Comput. Complex..
[20] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[21] Yuval Ishai,et al. Secure Arithmetic Computation with No Honest Majority , 2008, IACR Cryptol. ePrint Arch..
[22] Enav Weinreb,et al. Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries , 2008, CRYPTO.
[23] Benny Applebaum,et al. Arithmetic Cryptography: Extended Abstract , 2015, ITCS.
[24] Niv Gilboa,et al. Two Party RSA Key Generation , 1999, CRYPTO.
[25] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[26] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[27] Ivan Damgård,et al. Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.
[28] E. Gilbert. A comparison of signalling alphabets , 1952 .
[29] Benny Applebaum,et al. Cryptographic Hardness of Random Local Functions , 2013, computational complexity.
[30] Yuval Ishai,et al. How to Garble Arithmetic Circuits , 2011, FOCS.
[31] Marcel Keller,et al. Actively Secure OT Extension with Optimal Overhead , 2015, CRYPTO.
[32] Huijia Lin,et al. Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs , 2017, CRYPTO.
[33] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[34] Daniel A. Spielman. Linear-time encodable and decodable error-correcting codes , 1996, IEEE Trans. Inf. Theory.
[35] Yuval Ishai,et al. Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications , 2014, ITCS.
[36] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[37] Shachar Lovett,et al. Algebraic Attacks against Random Local Functions and Their Countermeasures , 2015, SIAM J. Comput..
[38] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[39] Vinod Vaikuntanathan,et al. Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[40] Amit Sahai,et al. Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps , 2017, EUROCRYPT.
[41] Huijia Lin,et al. Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.
[42] Yehuda Lindell,et al. More Efficient Oblivious Transfer Extensions , 2017, Journal of Cryptology.
[43] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[44] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[45] Benny Applebaum,et al. A Dichotomy for Local Small-Bias Generators , 2012, TCC.
[46] Rafail Ostrovsky,et al. Cryptography with constant computational overhead , 2008, STOC.
[47] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[48] Hugo Krawczyk,et al. On the existence of pseudorandom generators , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[49] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[50] Santosh S. Vempala,et al. University of Birmingham On the Complexity of Random Satisfiability Problems with Planted Solutions , 2018 .
[51] Marcel Keller,et al. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer , 2016, IACR Cryptol. ePrint Arch..
[52] David Witmer,et al. Goldreich's PRG: Evidence for Near-Optimal Polynomial Stretch , 2014, 2014 IEEE 29th Conference on Computational Complexity (CCC).
[53] Moni Naor,et al. Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..
[54] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[55] Benny Applebaum. Cryptographic Hardness of Random Local Functions , 2015, computational complexity.