Information-theoretically secure oblivious polynomial evaluation in the commodity-based model (original) (raw)

Secure Multiparty Computation via Oblivious Polynomial Evaluation

Attila Özgit

Theory and Practice of Cryptography Solutions for Secure Information Systems, 2013

View PDFchevron_right

Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security

Tatsuaki Okamoto

Lecture Notes in Computer Science, 2012

View PDFchevron_right

On Unconditionally Secure Distributed Oblivious Transfer

Svetla Nikova

Journal of Cryptology, 2007

View PDFchevron_right

Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation

Attila Özgit

… of Information and Networks: Proceedings of …, 2008

View PDFchevron_right

New Results on Unconditionally Secure Distributed Oblivious Transfer

Carlo Blundo

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Constant-round secure two-party computation from a linear number of oblivious transfer

Alain Tapp

View PDFchevron_right

Partial Fairness in Secure Two-Party Computation

Jonathan Katz

2012

View PDFchevron_right

Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection

Stanislaw Jarecki

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Oblivious decision program evaluation

Babak Sadeghiyan

IET Information Security, 2013

View PDFchevron_right

Oblivious Transfer and n-Variate Linear Function Evaluation

Yeow Meng Chee

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Constant-Round Concurrent Zero-Knowledge in Super-Polynomial Simulation Security

Tatsuaki Okamoto

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation

Yeow Meng Chee

2016

View PDFchevron_right

Information-Theoretic Conditions for Two-Party Secure Function Evaluation

Claude Crépeau

Lecture Notes in Computer Science, 2006

View PDFchevron_right

On the Bringer–Chabanne EPIR protocol for polynomial evaluation

Yeow Meng Chee

Journal of Mathematical Cryptology, 2012

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer (Abstract)

Claude Crépeau

International Cryptology Conference, 1988

View PDFchevron_right

Oblivious Transfer and Linear Functions

Fer XD

2006

View PDFchevron_right

Communication-efficient distributed oblivious transfer

Yeow Meng Chee

Journal of Computer and System Sciences, 2012

View PDFchevron_right

Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions

Anderson Nascimento

Anais do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2011)

View PDFchevron_right

Strong Conditional Oblivious Transfer and Computing on Intervals

Ian Blake

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications

Dana Dachman-soled

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Multi-party computation with conversion of secret sharing

Hossein Ghodosi

Designs, Codes and Cryptography, 2011

View PDFchevron_right

Efficient Unconditional Oblivious Transfer From Almost Any Noisy Channel

Kirill Morozov

Security in Communication Networks, 2005

View PDFchevron_right

Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography

Vipul Goyal

View PDFchevron_right

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits

Pratik Sarkar

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

Secure Two-Party Computation via Leaky Generalized Oblivious Transfer

Alain Tapp

View PDFchevron_right

S.: Efficient unconditional oblivious transfer from almost any noisy channel

Kirill Morozov

2004

View PDFchevron_right

Secrecy of cryptographic protocols under equational theory

Hanane Houmani, Hamido Fujita

Knowledge-Based Systems, 2009

View PDFchevron_right

Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets

Shlomi Dolev

IACR Cryptol. ePrint Arch., 2019

View PDFchevron_right

QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field

Pratik Sarkar

Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

View PDFchevron_right

Efficient and Universally Composable Committed Oblivious Transfer and Applications

Juan A. Garay

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Non-Interactive Secure Multiparty Computation

Anat Paskin-Cherniavsky

Advances in Cryptology – CRYPTO 2014, 2014

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer

Claude Crépeau

Lecture Notes in Computer Science

View PDFchevron_right

Derandomizing Polynomial Identity Tests Means Proving Circuit Lower Bounds

Valentine Kabanets

computational complexity, 2004

View PDFchevron_right

Zero-knowledge from secure multiparty computation

Rafail Ostrovsky

Proceedings of the thirty-ninth annual ACM symposium on Theory of computing - STOC '07, 2007

View PDFchevron_right