1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (English)
Free access
- New search for: Beimel, Amos
- New search for: Lindell, Yehuda
- New search for: Omri, Eran
- New search for: Orlov, Ilan
- New search for: Beimel, Amos
- New search for: Lindell, Yehuda
- New search for: Omri, Eran
- New search for: Orlov, Ilan
In:
Advances in Cryptology – CRYPTO 2011
5
;
277-296
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
-
Contributors:Beimel, Amos ( author ) / Lindell, Yehuda ( author ) / Omri, Eran ( author ) / Orlov, Ilan ( author )
-
Published in:Advances in Cryptology – CRYPTO 2011 , 5 ; 277-296Lecture Notes in Computer Science ; 6841, 5 ; 277-296
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Leftover Hash Lemma, RevisitedBarak, Boaz / Dodis, Yevgeniy / Krawczyk, Hugo / Pereira, Olivier / Pietrzak, Krzysztof / Standaert, François-Xavier / Yu, Yu et al. | 2011
- 21
-
Random Oracle ReducibilityBaecher, Paul / Fischlin, Marc et al. | 2011
- 39
-
Time-Lock Puzzles in the Random Oracle ModelMahmoody, Mohammad / Moran, Tal / Vadhan, Salil et al. | 2011
- 51
-
Physically Uncloneable Functions in the Universal Composition FrameworkBrzuska, Christina / Fischlin, Marc / Schröder, Heike / Katzenbeisser, Stefan et al. | 2011
- 71
-
Computer-Aided Security Proofs for the Working CryptographerBarthe, Gilles / Grégoire, Benjamin / Heraud, Sylvain / Béguelin, Santiago Zanella et al. | 2011
- 91
-
Optimal Verification of Operations on Dynamic SetsPapamanthou, Charalampos / Tamassia, Roberto / Triandopoulos, Nikos et al. | 2011
- 111
-
Verifiable Delegation of Computation over Large DatasetsBenabbas, Siavosh / Gennaro, Rosario / Vahlis, Yevgeniy et al. | 2011
- 132
-
Secure Computation on the Web: Computing without Simultaneous InteractionHalevi, Shai / Lindell, Yehuda / Pinkas, Benny et al. | 2011
- 151
-
Memory DelegationChung, Kai-Min / Kalai, Yael Tauman / Liu, Feng-Hao / Raz, Ran et al. | 2011
- 169
-
Automatic Search of Attacks on Round-Reduced AES and ApplicationsBouillaguet, Charles / Derbez, Patrick / Fouque, Pierre-Alain et al. | 2011
- 188
-
How to Improve Rebound AttacksNaya-Plasencia, María et al. | 2011
- 206
-
A Cryptanalysis of PRINTcipher: The Invariant Subspace AttackLeander, Gregor / Abdelraheem, Mohamed Ahmed / AlKhzaimi, Hoda / Zenner, Erik et al. | 2011
- 222
-
The PHOTON Family of Lightweight Hash FunctionsGuo, Jian / Peyrin, Thomas / Poschmann, Axel et al. | 2011
- 240
-
Perfectly-Secure Multiplication for Any t < n/3Asharov, Gilad / Lindell, Yehuda / Rabin, Tal et al. | 2011
- 259
-
The IPS Compiler: Optimizations, Variants and Concrete EfficiencyLindell, Yehuda / Oxman, Eli / Pinkas, Benny et al. | 2011
- 277
-
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both WorldsBeimel, Amos / Lindell, Yehuda / Omri, Eran / Orlov, Ilan et al. | 2011
- 297
-
Leakage-Resilient Zero KnowledgeGarg, Sanjam / Jain, Abhishek / Sahai, Amit et al. | 2011
- 316
-
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation FrameworkWhitnall, Carolyn / Oswald, Elisabeth et al. | 2011
- 335
-
Key-Evolution Schemes Resilient to Space-Bounded LeakageDziembowski, Stefan / Kazana, Tomasz / Wichs, Daniel et al. | 2011
- 354
-
Generic Side-Channel Distinguishers: Improvements and LimitationsVeyrat-Charvillon, Nicolas / Standaert, François-Xavier et al. | 2011
- 373
-
Cryptography with Tamperable and Leaky MemoryKalai, Yael Tauman / Kanukurthi, Bhavana / Sahai, Amit et al. | 2011
- 391
-
Merkle Puzzles in a Quantum WorldBrassard, Gilles / Høyer, Peter / Kalach, Kassem / Kaplan, Marc / Laplante, Sophie / Salvail, Louis et al. | 2011
- 411
-
Classical Cryptographic Protocols in a Quantum WorldHallgren, Sean / Smith, Adam / Song, Fang et al. | 2011
- 429
-
Position-Based Quantum Cryptography: Impossibility and ConstructionsBuhrman, Harry / Chandran, Nishanth / Fehr, Serge / Gelles, Ran / Goyal, Vipul / Ostrovsky, Rafail / Schaffner, Christian et al. | 2011
- 447
-
Analyzing Blockwise Lattice Algorithms Using Dynamical SystemsHanrot, Guillaume / Pujol, Xavier / Stehlé, Damien et al. | 2011
- 465
-
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision ReductionsMicciancio, Daniele / Mol, Petros et al. | 2011
- 485
-
Tor and Circumvention: Lessons LearnedDingledine, Roger et al. | 2011
- 487
-
Fully Homomorphic Encryption over the Integers with Shorter Public KeysCoron, Jean-Sébastien / Mandal, Avradip / Naccache, David / Tibouchi, Mehdi et al. | 2011
- 505
-
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent MessagesBrakerski, Zvika / Vaikuntanathan, Vinod et al. | 2011
- 525
-
Bi-Deniable Public-Key EncryptionO’Neill, Adam / Peikert, Chris / Waters, Brent et al. | 2011
- 543
-
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input SettingBrakerski, Zvika / Segev, Gil et al. | 2011
- 561
-
The Collision Security of Tandem-DM in the Ideal Cipher ModelLee, Jooyoung / Stam, Martijn / Steinberger, John et al. | 2011
- 578
-
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative SolutionsBoldyreva, Alexandra / Chenette, Nathan / O’Neill, Adam et al. | 2011
- 596
-
A New Variant of PMAC: Beyond the Birthday BoundYasuda, Kan et al. | 2011
- 610
-
Authenticated and Misuse-Resistant Encryption of Key-Dependent DataBellare, Mihir / Keelveedhi, Sriram et al. | 2011
- 630
-
Round Optimal Blind SignaturesGarg, Sanjam / Rao, Vanishree / Sahai, Amit / Schröder, Dominique / Unruh, Dominique et al. | 2011
- 649
-
Optimal Structure-Preserving Signatures in Asymmetric Bilinear GroupsAbe, Masayuki / Groth, Jens / Haralambiev, Kristiyan / Ohkubo, Miyako et al. | 2011
- 667
-
Constant-Rate Oblivious Transfer from Noisy ChannelsIshai, Yuval / Kushilevitz, Eyal / Ostrovsky, Rafail / Prabhakaran, Manoj / Sahai, Amit / Wullschleger, Jürg et al. | 2011
- 685
-
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret SharingCascudo, Ignacio / Cramer, Ronald / Xing, Chaoping et al. | 2011
- 706
-
Public-Key Identification Schemes Based on Multivariate Quadratic PolynomialsSakumoto, Koichi / Shirai, Taizo / Hiwatari, Harunaga et al. | 2011
- 724
-
Inverting HFE Systems Is Quasi-Polynomial for All FieldsDing, Jintai / Hodges, Timothy J. et al. | 2011
- 743
-
Smaller Decoding Exponents: Ball-Collision DecodingBernstein, Daniel J. / Lange, Tanja / Peters, Christiane et al. | 2011
- 761
-
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling AttacksDinh, Hang / Moore, Cristopher / Russell, Alexander et al. | 2011