Garbled RAM Revisited, Part II
暂无分享,去创建一个
[1] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[2] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[3] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[4] Craig Gentry,et al. Garbled RAM Revisited, Part I , 2014, IACR Cryptol. ePrint Arch..
[5] Mihir Bellare,et al. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing , 2012, ASIACRYPT.
[6] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[7] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[8] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[9] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[10] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[11] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[12] Yael Tauman Kalai,et al. How to Run Turing Machines on Encrypted Data , 2013, CRYPTO.
[13] Silvio Micali,et al. How to Construct Random Functions (Extended Abstract) , 1984, FOCS.
[14] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[15] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[16] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[17] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[18] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[19] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[20] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[21] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[22] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.