Found 16 Documents (Results 1–16)
Oblivious transfer from trapdoor permutations in minimal rounds. (English) Zbl 1511.94077
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 518-549 (2021).
Computational two-party correlation: a dichotomy for key-agreement protocols. (English) Zbl 1498.94064
Channels of small log-ratio leakage and characterization of two-party differentially private computation. (English) Zbl 1455.94162
Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 531-560 (2019).
Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutations. (English) Zbl 1443.94060
Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 448-475 (2018).
MSC:
94A60
Finding collisions in interactive protocols – tight lower bounds on the round and communication complexities of statistically hiding commitments. (English) Zbl 1397.94068
An almost-optimally fair three-party coin-flipping protocol. (English) Zbl 1315.94078
Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 408-416 (2014).
Basing non-interactive zero-knowledge on (enhanced) trapdoor permutations: the state of the art. (English) Zbl 1343.94053
Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 406-421 (2011).
On constructing 1-1 one-way functions. (English) Zbl 1343.94056
Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 13-25 (2011).
MSC:
94A60
On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. (English) Zbl 1239.94054
Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 389-406 (2009).
MSC:
94A60
Oblivious transfer based on the McEliece assumptions. (English) Zbl 1162.94353
Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 107-117 (2008).
A linear lower bound on the communication complexity of single-server private information retrieval. (English) Zbl 1162.94363
Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 445-464 (2008).
MSC:
94A60
Semi-honest to malicious oblivious transfer-the black-box way. (English) Zbl 1162.94362
Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 412-426 (2008).
MSC:
94A60
Filter Results by …
Document Type
- Journal Articles (6)
- Collection Articles (10)
all
top 5
Author
- Haitner, Iftach (7)
- Goldreich, Oded (3)
- Hoch, Jonathan J. (2)
- Omri, Eran (2)
- Segev, Gil (2)
- Shaltiel, Ronen (2)
- Silbak, Jad (2)
- Tsfadia, Eliad (2)
- Alon, Bar (1)
- Beimel, Amos (1)
- Chee, Yeow Meng (1)
- Choudhuri, Arka Rai (1)
- Ciampi, Michele (1)
- Dowsley, Rafael (1)
- Goyal, Vipul (1)
- Jain, Abhishek (1)
- Kiltz, Eike (1)
- Levin, Leonid A. (1)
- Mazor, Noam (1)
- Müller-Quade, Jörn (1)
- Nascimento, Anderson C. A. (1)
- Nisan, Noam (1)
- Nissim, Kobbi (1)
- Ostrovsky, Rafail (1)
- Pietrzak, Krzysztof (1)
- Reingold, Omer (1)
- Rothblum, Ron D. (1)
- van de Graaf, Jeroen (1)
- Wang, Huaxiong (1)
- Zhang, Liang Feng (1)
Serial
- SIAM J. Comput. (3)
- J. Cryptology (2)
- J. Comput. Syst. Sci. (1)
Software
- SuLQ (1)