Lower-Bounds on Public-Key Operations in PIR (English)
- New search for: Dujmovic, Jesko
- New search for: Hajiabadi, Mohammad
- New search for: Joye, Marc
- Further information on Joye, Marc:
- https://orcid.org/https://orcid.org/0000-0003-4433-2333
- New search for: Leander, Gregor
- Further information on Leander, Gregor:
- https://orcid.org/https://orcid.org/0000-0002-2579-8587
- New search for: Dujmovic, Jesko
- New search for: Hajiabadi, Mohammad
In:
Advances in Cryptology – EUROCRYPT 2024
: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI
;
Chapter: 3
;
65-87
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:Lower-Bounds on Public-Key Operations in PIR
-
Additional title:Lect.Notes Computer
-
Contributors:Joye, Marc ( editor ) / Leander, Gregor ( editor ) / Dujmovic, Jesko ( author ) / Hajiabadi, Mohammad ( author )
-
Conference:Annual International Conference on the Theory and Applications of Cryptographic Techniques ; 2024 ; Zurich, Switzerland
-
Published in:Advances in Cryptology – EUROCRYPT 2024 : 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI ; Chapter: 3 ; 65-87Lecture Notes in Computer Science ; 14656 ; 65-87
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-04-29
-
Size:23 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Jolt: SNARKs for Virtual Machines via LookupsArun, Arasu / Setty, Srinath / Thaler, Justin et al. | 2024
- 2
-
Constant-Size zk-SNARKs in ROM from Falsifiable AssumptionsLipmaa, Helger / Parisella, Roberto / Siim, Janno et al. | 2024
- 3
-
Lower-Bounds on Public-Key Operations in PIRDujmovic, Jesko / Hajiabadi, Mohammad et al. | 2024
- 4
-
Fast Public-Key Silent OT and More from Constrained Naor-ReingoldBui, Dung / Couteau, Geoffroy / Meyer, Pierre / Passelègue, Alain / Riahinia, Mahshid et al. | 2024
- 5
-
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable AbortChung, Kai-Min / Huang, Mi-Ying / Tang, Er-Cheng / Zhang, Jiapeng et al. | 2024
- 6
-
The Hardness of LPN over Any Integer Ring and Field for PCG ApplicationsLiu, Hanlin / Wang, Xiao / Yang, Kang / Yu, Yu et al. | 2024
- 7
-
Unlocking the Lookup Singularity with LassoSetty, Srinath / Thaler, Justin / Wahby, Riad et al. | 2024
- 8
-
Efficient Pre-processing PIR Without Public-Key CryptographyGhoshal, Ashrujit / Zhou, Mingxun / Shi, Elaine et al. | 2024
- 9
-
Strong Batching for Non-interactive Statistical Zero-KnowledgeMu, Changrui / Nassar, Shafik / Rothblum, Ron D. / Vasudevan, Prashant Nalini et al. | 2024
- 10
-
Two-Round Maliciously-Secure Oblivious Transfer with Optimal RateBranco, Pedro / Döttling, Nico / Srinivasan, Akshayaram et al. | 2024
- 11
-
Succinct Homomorphic Secret SharingAbram, Damiano / Roy, Lawrence / Scholl, Peter et al. | 2024
- 12
-
How to Garble Mixed Circuits that Combine Boolean and Arithmetic ComputationsLi, Hanjun / Liu, Tianren et al. | 2024
- 13
-
M&M’S: Mix and Match Attacks on Schnorr-Type Blind Signatures with RepetitionDo, Khue / Hanzlik, Lucjan / Paracucchi, Eugenio et al. | 2024
- 14
-
The Supersingular Endomorphism Ring and One Endomorphism Problems are EquivalentPage, Aurel / Wesolowski, Benjamin et al. | 2024
- 15
-
Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle ModelJackson, Kelsey A. / Miller, Carl A. / Wang, Daochen et al. | 2024
- 16
-
Crypto Dark Matter on the TorusAlbrecht, Martin R. / Davidson, Alex / Deo, Amit / Gardham, Daniel et al. | 2024