Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (27. : 2021 : Online) Advances in cryptology - ASIACRYPT 2021 ; Part 2
1. Verfasser: Eriguchi, Reo (VerfasserIn)
Weitere Verfasser: Nuida, Koji (VerfasserIn)
Pages:2021
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure and Efficient Software Masking on Superscalar Pipelined Processors 2021 Gigerl, Barbara
Improved Single-Round Secure Multiplication Using Regenerating Codes 2021 Abspoel, Mark
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials 2021 Eriguchi, Reo
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups 2021 Baarsen, Aron van
Simulation-Based Bi-Selective Opening Security for Public Key Encryption 2021 Lai, Junzuo
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy 2021 Beskorovajnov, Wasilij
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite 2021 Fischlin, Marc
Fault-Injection Attacks Against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates 2021 Xagawa, Keita
Efficient Leakage-Resilient MACs Without Idealized Assumptions 2021 Berti, Francesco
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity 2021 Belaid, Sonia
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation 2021 Chen, Yu Long
Reverse Firewalls for Adaptively Secure MPC Without Setup 2021 Chakraborty, Suvradip
DEFAULT: Cipher Level Resistance Against Differential Fault Attack 2021 Baksi, Anubhab
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks 2021 Saha, Sayandeep
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH 2021 Alamati, Navid
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE 2021 Wang, Yi
Hierarchical Integrated Signature and Encryption: (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds) 2021 Chen, Yu
Private Join and Compute from PIR with Default 2021 Lepoint, Tancrède
Onion Routing with Replies 2021 Kuhn, Christiane
Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation 2021 Heath, David
Alle Artikel auflisten