Lower Bound Framework for Differentially Private and Oblivious Data Structures (Englisch)
- Neue Suche nach: Persiano, Giuseppe
- Neue Suche nach: Yeo, Kevin
- Neue Suche nach: Persiano, Giuseppe
- Neue Suche nach: Yeo, Kevin
In:
Advances in cryptology - EUROCRYPT 2023 ; Part 1
; 487-517
;
2023
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Lower Bound Framework for Differentially Private and Oblivious Data Structures
-
Beteiligte:Persiano, Giuseppe ( Autor:in ) / Yeo, Kevin ( Autor:in )
-
Kongress:EUROCRYPT ; 42. ; 2023 ; Lyon
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2023
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Indistinguishable Predictions and Multi-group Fair LearningRothblum, Guy N. et al. | 2023
- 25
-
Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant LocalityÜnal, Akin et al. | 2023
- 55
-
Fine-Grained Non-interactive Key-Exchange: Constructions and Lower BoundsAfshar, Abtin / Couteau, Geoffroy / Mahmoody, Mohammad / Sadeghi, Elahe et al. | 2023
- 86
-
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, RevisitedDodis, Yevgeniy / Quach, Willy / Wichs, Daniel et al. | 2023
- 117
-
Non-uniformity and Quantum Advice in the Quantum Random Oracle ModelLiu, Qipeng et al. | 2023
- 144
-
Black-Box Separations for Non-interactive Classical Commitments maQuantum WorldChung, Kai-Min / Lin, Yao-Ting / Mahmoody, Mohammad et al. | 2023
- 173
-
On Non-uniform Security for Black-Box Non-interactive CCA CommitmentsGarg, Rachit / Khurana, Dakshita / Lu, George / Waters, Brent et al. | 2023
- 205
-
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum iOJain, Aayush / Lin, Huijia / Lou, Paul / Sahai, Amit et al. | 2023
- 239
-
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-KnowledgeChakraborty, Suvradip / Ganesh, Chaya / Sarkar, Pratik et al. | 2023
- 271
-
Oblivious Transfer with Constant Computational OverheadBoyle, Elette / Couteau, Geoffroy / Gilboa, Niv / Ishai, Yuval / Kohl, Lisa / Resch, Nicolas / Scholl, Peter et al. | 2023
- 303
-
Endemic Oblivious Transfer via Random Oracles, RevisitedZhou, Zhelei / Zhang, Bingsheng / Zhou, Hong-Sheng / Ren, Kui et al. | 2023
- 330
-
Half-Tree: Halving the Cost of Tree Expansion in COT and DPFGuo, Xiaojie / Yang, Kang / Wang, Xiao / Zhang, Wenhao / Xie, Xiang / Zhang, Jiang / Liu, Zheli et al. | 2023
- 363
-
A New Framework for Quantum Oblivious TransferAgarwal, Amit / Bartusek, James / Khurana, Dakshita / Kumar, Nishant et al. | 2023
- 395
-
Optimal Single-Server Private Information RetrievalZhou, Mingxun / Lin, Wei-Kai / Tselekounis, Yiannis / Shi, Elaine et al. | 2023
- 426
-
Weighted Oblivious RAM, with Applications to Searchable Symmetric EncryptionAssouline, Léonard / Minaud, Brice et al. | 2023
- 456
-
NanoGRAM: Garbled RAM with Õ(log N)OverheadPark, Andrew / Lin, Wei-Kai / Shi, Elaine et al. | 2023
- 487
-
Lower Bound Framework for Differentially Private and Oblivious Data StructuresPersiano, Giuseppe / Yeo, Kevin et al. | 2023
- 518
-
Lower Bounds for (Batch) PIR with Private PreprocessingYeo, Kevin et al. | 2023
- 551
-
How to Compress Encrypted DataFleischhacker, Nils / Larsen, Kasper Green / Simkin, Mark et al. | 2023
- 581
-
Public Key Encryption with Secure Key LeasingAgrawal, Shweta / Kitagawa, Fuyuki / Nishimaki, Ryo / Yamada, Shota / Yamakawa, Takashi et al. | 2023
- 611
-
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and MoreLiu, Jiahui / Montgomery, Hart / Zhandry, Mark et al. | 2023
- 639
-
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and CommitmentsHhan, Minki / Morimae, Tomoyuki / Yamakawa, Takashi et al. | 2023
-
Correction to: Half-Tree: Halving the Cost of Tree Expansion in COT and DPFGuo, Xiaojie / Yang, Kang / Wang, Xiao / Zhang, Wenhao / Xie, Xiang / Zhang, Jiang / Liu, Zheli et al. | 2023