-
1
-
-
27644557351
-
Computationally private randomizing polynomials and their applications
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. In: CCC, pp. 260-274 (2005)
-
(2005)
CCC
, pp. 260-274
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
38049039951
-
On locally decodable codes, self-correctable codes, and t-private PIR
-
Charikar, M., Jansen, K., Reingold, O., Rolim, J.D.P. (eds.) APPROX and RANDOM 2007 Springer, Heidelberg
-
Barkol, O., Ishai, Y., Weinreb, E.: On locally decodable codes, self-correctable codes, and t-private PIR. In: Charikar, M., Jansen, K., Reingold, O., Rolim, J.D.P. (eds.) APPROX and RANDOM 2007. LNCS, vol. 4627, pp. 311-325. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4627
, pp. 311-325
-
-
Barkol, O.1
Ishai, Y.2
Weinreb, E.3
-
3
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: STOC, pp. 479-488 (1996)
-
(1996)
STOC
, pp. 479-488
-
-
Beaver, D.1
-
4
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D. (ed.) CRYPTO 1995 Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
5
-
-
84979502594
-
Security with low communication overhead
-
Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990 Springer, Heidelberg
-
Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Security with low communication overhead. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 62-76. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
6
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. Journal of Cryptology 10(1), 17-36 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
7
-
-
0029513522
-
Lower bounds on monotone span programs
-
Beimel, A., Gal, A., Paterson, M.: Lower bounds on monotone span programs. In: FOCS, pp. 674-681 (1995)
-
(1995)
FOCS
, pp. 674-681
-
-
Beimel, A.1
Gal, A.2
Paterson, M.3
-
8
-
-
84865527639
-
Secret sharing for very dense graphs
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012 Springer, Heidelberg
-
Beimel, A., Farr̀as, O., Mintz, Y.: Secret sharing for very dense graphs. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 144-161. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 144-161
-
-
Beimel, A.1
Farr̀as, O.2
Mintz, Y.3
-
9
-
-
0034865642
-
On the power of nonlinear secret sharing
-
Beimel, A., Ishai, Y.: On the power of nonlinear secret sharing. In: CCC, pp. 188-202 (2001)
-
(2001)
CCC
, pp. 188-202
-
-
Beimel, A.1
Ishai, Y.2
-
10
-
-
21144453606
-
General constructions for informationtheoretic private information retrieval
-
Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for informationtheoretic private information retrieval. Jour. Comput. Syst. & Sci. 71(2), 213-247 (2005)
-
(2005)
Jour. Comput. Syst. & Sci.
, vol.71
, Issue.2
, pp. 213-247
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
11
-
-
84866508151
-
Share conversion and private information retrieval
-
Beimel, A., Ishai, Y., Kushilevitz, E., Orlov, I.: Share conversion and private information retrieval. In: CCC, pp. 258-268 (2012)
-
(2012)
CCC
, pp. 258-268
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Orlov, I.4
-
12
-
-
35048856983
-
A quantitative approach to reductions in secure computation
-
Naor, M. (ed.) TCC 2004 Springer, Heidelberg
-
Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 238-257
-
-
Beimel, A.1
Malkin, T.2
-
13
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC, pp. 1-10 (1988)
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
14
-
-
79958004492
-
Semi-homomorphic encryption and multiparty computation
-
Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
-
Bendlin, R., Damgrard, I., Orlandi, C., Zakarias, S.: Semi-homomorphic encryption and multiparty computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 169-188. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 169-188
-
-
Bendlin, R.1
Damgrard, I.2
Orlandi, C.3
Zakarias, S.4
-
15
-
-
0001003172
-
Tight bounds on information rate of secret sharing schemes
-
Blundo, C., De Santis, A., de Simone, R., Vaccaro, U.: Tight bounds on information rate of secret sharing schemes. In: Designs, Codes and Cryptography, pp. 107-122 (1997)
-
(1997)
Designs, Codes and Cryptography
, pp. 107-122
-
-
Blundo, C.1
De Santis, A.2
De Simone, R.3
Vaccaro, U.4
-
16
-
-
0030569864
-
On information rate of secret sharing schemes
-
Blundo, C., De Santis, A., Gargano, L., Vaccaro, U.: On information rate of secret sharing schemes. Theoretical Computer Science, 283-306 (1996)
-
(1996)
Theoretical Computer Science
, pp. 283-306
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
17
-
-
0022864717
-
Information theoretic reduction among disclosure problems
-
Brassard, G., Crepeau, C., Robert, J.-M.: Information theoretic reduction among disclosure problems. In: FOCS, pp. 168-173 (1986)
-
(1986)
FOCS
, pp. 168-173
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.-M.3
-
18
-
-
0022895407
-
Decomposition of graphs and monotone formula size of homogeneous functions
-
Bublitz, S.: Decomposition of graphs and monotone formula size of homogeneous functions. In: Acta Informatica, pp. 689-696 (1986)
-
(1986)
Acta Informatica
, pp. 689-696
-
-
Bublitz, S.1
-
19
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Cŕepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19 (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Cŕepeau, C.2
Damgard, I.3
-
20
-
-
80053413438
-
Partial derivatives in arithmetic complexity and beyond
-
Chen, X., Kayal, N., Wigderson, A.: Partial derivatives in arithmetic complexity and beyond. In: FSTTCS, pp. 1-138 (2011)
-
(2011)
FSTTCS
, pp. 1-138
-
-
Chen, X.1
Kayal, N.2
Wigderson, A.3
-
21
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS, pp. 41-50 (1995)
-
(1995)
FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
22
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions (extended abstract)
-
Crepeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42-52 (1988)
-
(1988)
FOCS
, pp. 42-52
-
-
Crepeau, C.1
Kilian, J.2
-
24
-
-
84873966735
-
Constant-overhead secure computation of boolean circuits using preprocessing
-
Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
-
Damgrard, I., Zakarias, S.: Constant-overhead secure computation of boolean circuits using preprocessing. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 621-641. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 621-641
-
-
Damgrard, I.1
Zakarias, S.2
-
25
-
-
84974597111
-
Parallel reducibility for information-theoretically secure computation
-
Bellare, M. (ed.) CRYPTO 2000 Springer, Heidelberg
-
Dodis, Y., Micali, S.: Parallel reducibility for information- theoretically secure computation. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 74-92. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 74-92
-
-
Dodis, Y.1
Micali, S.2
-
26
-
-
78751499873
-
Matching vector codes
-
Dvir, Z., Gopalan, P., Yekhanin, S.: Matching vector codes. In: FOCS, pp. 705-714 (2010)
-
(2010)
FOCS
, pp. 705-714
-
-
Dvir, Z.1
Gopalan, P.2
Yekhanin, S.3
-
27
-
-
70350642094
-
3-query locally decodable codes of subexponential length
-
Efremenko, K.: 3-query locally decodable codes of subexponential length. In: STOC, pp. 39-44 (2009)
-
(2009)
STOC
, pp. 39-44
-
-
Efremenko, K.1
-
28
-
-
0041135073
-
Covering a graph by complete bipartite graphs
-
Erdos, P., Pyber, L.: Covering a graph by complete bipartite graphs. In: Discrete Mathematics, pp. 249-251 (1997)
-
(1997)
Discrete Mathematics
, pp. 249-251
-
-
Erdos, P.1
Pyber, L.2
-
29
-
-
0020878801
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Crypto, pp. 205-210 (1983)
-
(1983)
Crypto
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
30
-
-
0027986369
-
A minimal model for secure computation (extended abstract)
-
Feige, U., Kilian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC, pp. 554-563 (1994)
-
(1994)
STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
32
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
33
-
-
85032194875
-
How to solve any protocol problem-an efficiency improvement
-
Pomerance, C. (ed.) CRYPTO 1987 Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem-an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
34
-
-
38049107215
-
How many oblivious transfers are needed for secure multiparty computation?
-
Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
-
Harnik, D., Ishai, Y., Kushilevitz, E.: How many oblivious transfers are needed for secure multiparty computation? In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 284-302. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 284-302
-
-
Harnik, D.1
Ishai, Y.2
Kushilevitz, E.3
-
35
-
-
40249091385
-
OT-combiners via secure computation
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Harnik, D., Ishai, Y., Kushilevitz, E., Nielsen, J.B.: OT-combiners via secure computation. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 393-411. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 393-411
-
-
Harnik, D.1
Ishai, Y.2
Kushilevitz, E.3
Nielsen, J.B.4
-
36
-
-
84894276932
-
Randomization techniques for secure computation
-
Prabhakaran, M., Sahai, A. (eds.)
-
Ishai, Y.: Randomization techniques for secure computation. In: Prabhakaran, M., Sahai, A. (eds.) Secure Multi-Party Computation (2013)
-
(2013)
Secure Multi-Party Computation
-
-
Ishai, Y.1
-
37
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
38
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
Ishai, Y., Kushilevitz, E.: Private simultaneous messages protocols with applications. In: ISTCS, pp. 174-184 (1997)
-
(1997)
ISTCS
, pp. 174-184
-
-
Ishai, Y.1
Kushilevitz, E.2
-
39
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS, pp. 294-304 (2000)
-
(2000)
FOCS
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
40
-
-
33748114725
-
On the hardness of information-theoretic multiparty computation
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E.: On the hardness of information-theoretic multiparty computation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 439-455. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 439-455
-
-
Ishai, Y.1
Kushilevitz, E.2
-
41
-
-
84873953976
-
On the power of correlated randomness in secure computation
-
Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C., Paskin-Cherniavsky, A.: On the power of correlated randomness in secure computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 600-620. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 600-620
-
-
Ishai, Y.1
Kushilevitz, E.2
Meldgaard, S.3
Orlandi, C.4
Paskin-Cherniavsky, A.5
-
42
-
-
77952379198
-
Extracting correlations
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Extracting correlations. In: FOCS, pp. 261-270 (2009)
-
(2009)
FOCS
, pp. 261-270
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
43
-
-
51849102397
-
Founding cryptography on oblivious transfer-efficiently
-
Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer-efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
44
-
-
84880249454
-
Non-local box complexity and secure function evaluation
-
Kaplan, M., Kerenidis, I., Laplante, S., Roland, J.: Non-local box complexity and secure function evaluation. In: FSTTCS, pp. 239-250 (2009)
-
(2009)
FSTTCS
, pp. 239-250
-
-
Kaplan, M.1
Kerenidis, I.2
Laplante, S.3
Roland, J.4
-
45
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
-
(1988)
STOC
, pp. 20-31
-
-
Kilian, J.1
-
46
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
Kilian, J.: More general completeness theorems for secure two-party computation. In: STOC, pp. 316-324 (2000)
-
(2000)
STOC
, pp. 316-324
-
-
Kilian, J.1
-
47
-
-
33646813314
-
Gate evaluation secret sharing and secure one-round two-party computation
-
Roy, B. (ed.) ASIACRYPT 2005 Springer, Heidelberg
-
Kolesnikov, V.: Gate evaluation secret sharing and secure one-round two-party computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 136-155. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 136-155
-
-
Kolesnikov, V.1
-
52
-
-
77953754678
-
How to exchange secrets with oblivious transfer
-
Harvard University
-
Rabin, M.O.: How to exchange secrets with oblivious transfer. In: Technical Report TR-81, Aiken Computation Lab, Harvard University (1981)
-
(1981)
Technical Report TR-81 Aiken Computation Lab
-
-
Rabin, M.O.1
-
53
-
-
84938487169
-
The synthesis of two-terminal switching circuits
-
Shannon C.
-
Shannon, C.: The synthesis of two-terminal switching circuits. Bell System Technical Journal, 59-98 (1949)
-
(1949)
Bell System Technical Journal
, pp. 59-98
-
-
-
54
-
-
0031362824
-
Secret sharing in graph-based prohibited structures
-
Sun, H., Shieh, S.: Secret sharing in graph-based prohibited structures. In: INFOCOM, pp. 718-724 (1997)
-
(1997)
INFOCOM
, pp. 718-724
-
-
Sun, H.1
Shieh, S.2
-
55
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
van Dijk, M.: On the information rate of perfect secret sharing schemes. In: Designs, Codes and Cryptography, pp. 143-169 (1995)
-
(1995)
Designs, Codes and Cryptography
, pp. 143-169
-
-
Van Dijk, M.1
-
56
-
-
77956992510
-
On the efficiency of classical and quantum oblivious transfer reductions
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Winkler, S., Wullschleger, J.: On the efficiency of classical and quantum oblivious transfer reductions. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 707-723. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 707-723
-
-
Winkler, S.1
Wullschleger, J.2
-
57
-
-
40549129517
-
A geometric approach to information-theoretic private information retrieval
-
Woodruff, D., Yekhanin, S.: A geometric approach to information-theoretic private information retrieval. SIAM J. Comp. 37(4), 1046-1056 (2007)
-
(2007)
SIAM J. Comp.
, vol.37
, Issue.4
, pp. 1046-1056
-
-
Woodruff, D.1
Yekhanin, S.2
-
58
-
-
34648841198
-
Towards 3-query locally decodable codes of subexponential length
-
Yekhanin, S.: Towards 3-query locally decodable codes of subexponential length. In: STOC, pp. 266-274 (2007)
-
(2007)
STOC
, pp. 266-274
-
-
Yekhanin, S.1
|