Boyle, Elette; Cohen, Ran; Goel, Aarushi Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party. (English) Zbl 1527.94023 J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Boyle} et al., J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024; Zbl 1527.94023) Full Text: DOI arXiv
Han, Shuai; Liu, Shengli; Wang, Zhedong; Gu, Dawu Almost tight multi-user security under adaptive corruptions from LWE in the standard model. (English) Zbl 07800248 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 682-715 (2023). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Han} et al., Lect. Notes Comput. Sci. 14085, 682--715 (2023; Zbl 07800248) Full Text: DOI
Kim, Duhyeong; Lee, Dongwon; Seo, Jinyeong; Song, Yongsoo Toward practical lattice-based proof of knowledge from Hint-MLWE. (English) Zbl 07800244 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 549-580 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Kim} et al., Lect. Notes Comput. Sci. 14085, 549--580 (2023; Zbl 07800244) Full Text: DOI
Dao, Quang; Ishai, Yuval; Jain, Aayush; Lin, Huijia Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN. (English) Zbl 07799226 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 315-348 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Q. Dao} et al., Lect. Notes Comput. Sci. 14082, 315--348 (2023; Zbl 07799226) Full Text: DOI
Lee, Yongwoo; Micciancio, Daniele; Kim, Andrey; Choi, Rakyong; Deryabin, Maxim; Eom, Jieun; Yoo, Donghoon Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption. (English) Zbl 1528.94065 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 227-256 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Lee} et al., Lect. Notes Comput. Sci. 14006, 227--256 (2023; Zbl 1528.94065) Full Text: DOI
Boyle, Elette; Couteau, Geoffroy; Meyer, Pierre Sublinear-communication secure multiparty computation does not require FHE. (English) Zbl 07773986 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 159-189 (2023). MSC: 68Q10 68P27 68P20 68Q11 94A60 94A62 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 14005, 159--189 (2023; Zbl 07773986) Full Text: DOI
Fernando, Rex; Jain, Aayush; Komargodski, Ilan Maliciously-secure MrNISC in the plain model. (English) Zbl 07773984 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 98-128 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Fernando} et al., Lect. Notes Comput. Sci. 14005, 98--128 (2023; Zbl 07773984) Full Text: DOI
Lu, George; Waters, Brent How to sample a discrete Gaussian (and more) from a random oracle. (English) Zbl 1519.94167 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 653-682 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Lu} and \textit{B. Waters}, Lect. Notes Comput. Sci. 13748, 653--682 (2023; Zbl 1519.94167) Full Text: DOI
Boyle, Elette; Couteau, Geoffroy; Meyer, Pierre Sublinear secure computation from new assumptions. (English) Zbl 1519.94063 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 121-150 (2023). MSC: 94A60 68P25 68P20 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 13748, 121--150 (2023; Zbl 1519.94063) Full Text: DOI
Applebaum, Benny; Kachlon, Eliran; Patra, Arpita Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract). (English) Zbl 1519.94034 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 103-120 (2023). MSC: 94A60 68M14 68M25 PDFBibTeX XMLCite \textit{B. Applebaum} et al., Lect. Notes Comput. Sci. 13748, 103--120 (2023; Zbl 1519.94034) Full Text: DOI
Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio Candidate iO from homomorphic encryption schemes. (English) Zbl 1518.94048 J. Cryptology 36, No. 3, Paper No. 27, 41 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., J. Cryptology 36, No. 3, Paper No. 27, 41 p. (2023; Zbl 1518.94048) Full Text: DOI
Xu, Kexin; Tan, Benjamin Hong Meng; Wang, Li-Ping; Aung, Khin Mi Mi; Wang, Huaxiong Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping. (English) Zbl 07715630 Theor. Comput. Sci. 968, Article ID 114026, 16 p. (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{K. Xu} et al., Theor. Comput. Sci. 968, Article ID 114026, 16 p. (2023; Zbl 07715630) Full Text: DOI
Beullens, Ward; Dobson, Samuel; Katsumata, Shuichi; Lai, Yi-Fu; Pintore, Federico Group signatures and more from isogenies and lattices: generic, simple, and efficient. (English) Zbl 07690066 Des. Codes Cryptography 91, No. 6, 2141-2200 (2023). Reviewer: Jaak Henno (Tallinn) MSC: 94A62 94A60 14K02 14H52 81P94 PDFBibTeX XMLCite \textit{W. Beullens} et al., Des. Codes Cryptography 91, No. 6, 2141--2200 (2023; Zbl 07690066) Full Text: DOI
Cohen, Ran; Shelat, Abhi; Wichs, Daniel Adaptively secure MPC with sublinear communication complexity. (English) Zbl 1511.94006 J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023). MSC: 94A05 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023; Zbl 1511.94006) Full Text: DOI
Mouchet, Christian; Bertrand, Elliott; Hubaux, Jean-Pierre An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption. (English) Zbl 1511.94142 J. Cryptology 36, No. 2, Paper No. 10, 20 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Mouchet} et al., J. Cryptology 36, No. 2, Paper No. 10, 20 p. (2023; Zbl 1511.94142) Full Text: DOI
Sun, Shi-Feng; Steinfeld, Ron; Sakzad, Amin Incremental symmetric puncturable encryption with support for unbounded number of punctures. (English) Zbl 1522.94090 Des. Codes Cryptography 91, No. 4, 1401-1426 (2023). MSC: 94A60 68P25 81P94 PDFBibTeX XMLCite \textit{S.-F. Sun} et al., Des. Codes Cryptography 91, No. 4, 1401--1426 (2023; Zbl 1522.94090) Full Text: DOI
Nishimaki, Ryo The direction of updatable encryption does matter. (English) Zbl 1519.94180 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 194-224 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Nishimaki}, Lect. Notes Comput. Sci. 13178, 194--224 (2022; Zbl 1519.94180) Full Text: DOI
Blass, Erik-Oliver; Kerschbaum, Florian Mixed-technique multi-party computations composed of two-party computations. (English) Zbl 1524.68143 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13556, 295-319 (2022). MSC: 68Q10 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{E.-O. Blass} and \textit{F. Kerschbaum}, Lect. Notes Comput. Sci. 13556, 295--319 (2022; Zbl 1524.68143) Full Text: DOI
Yang, Rupeng; Yu, Zuoxia; Au, Man Ho; Susilo, Willy Public-key watermarking schemes for pseudorandom functions. (English) Zbl 1514.68068 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 637-667 (2022). MSC: 68P25 68N99 94A60 PDFBibTeX XMLCite \textit{R. Yang} et al., Lect. Notes Comput. Sci. 13508, 637--667 (2022; Zbl 1514.68068) Full Text: DOI
Fernando, Rex; Gelles, Yuval; Komargodski, Ilan; Shi, Elaine Maliciously secure massively parallel computation for all-but-one corruptions. (English) Zbl 07694635 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 688-718 (2022). MSC: 68M14 94A60 PDFBibTeX XMLCite \textit{R. Fernando} et al., Lect. Notes Comput. Sci. 13507, 688--718 (2022; Zbl 07694635) Full Text: DOI
Lin, Huijia; Liu, Tianren Two-round MPC without round collapsing revisited – towards efficient malicious protocols. (English) Zbl 1516.94041 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 353-382 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Lin} and \textit{T. Liu}, Lect. Notes Comput. Sci. 13507, 353--382 (2022; Zbl 1516.94041) Full Text: DOI
de Castro, Leo; Hazay, Carmit; Ishai, Yuval; Vaikuntanathan, Vinod; Venkitasubramaniam, Muthu Asymptotically quasi-optimal cryptography. (English) Zbl 1496.94039 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 303-334 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{L. de Castro} et al., Lect. Notes Comput. Sci. 13275, 303--334 (2022; Zbl 1496.94039) Full Text: DOI
Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram Round-optimal black-box protocol compilers. (English) Zbl 1499.68118 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 210-240 (2022). MSC: 68Q10 68N20 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 13275, 210--240 (2022; Zbl 1499.68118) Full Text: DOI
Wu, Ke; Asharov, Gilad; Shi, Elaine A complete characterization of game-theoretically fair, multi-party coin toss. (English) Zbl 1496.94071 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 120-149 (2022). MSC: 94A60 91A80 PDFBibTeX XMLCite \textit{K. Wu} et al., Lect. Notes Comput. Sci. 13275, 120--149 (2022; Zbl 1496.94071) Full Text: DOI
Devevey, Julien; Libert, Benoît; Peters, Thomas Rational modular encoding in the DCR setting: non-interactive range proofs and Paillier-based Naor-Yung in the standard model. (English) Zbl 1492.94089 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13177, 615-646 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Devevey} et al., Lect. Notes Comput. Sci. 13177, 615--646 (2022; Zbl 1492.94089) Full Text: DOI
Orlandi, Claudio; Ravi, Divya; Scholl, Peter On the bottleneck complexity of MPC with correlated randomness. (English) Zbl 1492.94156 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13177, 194-220 (2022). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Orlandi} et al., Lect. Notes Comput. Sci. 13177, 194--220 (2022; Zbl 1492.94156) Full Text: DOI
Kim, Jinsu; Kim, Dooyoung Zero-knowledge proofs from spLWE-based commitments. (English) Zbl 07546039 East Asian Math. J. 38, No. 1, 85-94 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Kim} and \textit{D. Kim}, East Asian Math. J. 38, No. 1, 85--94 (2022; Zbl 07546039) Full Text: DOI
Hazay, Carmit; Orsini, Emmanuela; Scholl, Peter; Soria-Vazquez, Eduardo TinyKeys: a new approach to efficient multi-party computation. (English) Zbl 1486.94106 J. Cryptology 35, No. 2, Paper No. 13, 66 p. (2022). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 35, No. 2, Paper No. 13, 66 p. (2022; Zbl 1486.94106) Full Text: DOI
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim Actively secure setup for SPDZ. (English) Zbl 1481.94122 J. Cryptology 35, No. 1, Paper No. 5, 32 p. (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Rotaru} et al., J. Cryptology 35, No. 1, Paper No. 5, 32 p. (2022; Zbl 1481.94122) Full Text: DOI
Dodis, Yevgeniy; Karthikeyan, Harish; Wichs, Daniel Updatable public key encryption in the standard model. (English) Zbl 1511.94089 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 254-285 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 13044, 254--285 (2021; Zbl 1511.94089) Full Text: DOI
Devadas, Lalita; Quach, Willy; Vaikuntanathan, Vinod; Wee, Hoeteck; Wichs, Daniel Succinct LWE sampling, random polynomials, and obfuscation. (English) Zbl 1511.94087 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 256-287 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Devadas} et al., Lect. Notes Comput. Sci. 13043, 256--287 (2021; Zbl 1511.94087) Full Text: DOI
Goyal, Vipul; Masserova, Elisaweta; Parno, Bryan; Song, Yifan Blockchains enable non-interactive MPC. (English) Zbl 1511.94105 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 162-193 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 13043, 162--193 (2021; Zbl 1511.94105) Full Text: DOI
Goel, Aarushi; Jain, Abhishek; Prabhakaran, Manoj; Raghunath, Rajeev On communication models and best-achievable security in two-round MPC. (English) Zbl 1511.94103 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 97-128 (2021). MSC: 94A60 94A05 PDFBibTeX XMLCite \textit{A. Goel} et al., Lect. Notes Comput. Sci. 13043, 97--128 (2021; Zbl 1511.94103) Full Text: DOI
Bartusek, James Secure quantum computation with classical communication. (English) Zbl 1520.81045 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 1-30 (2021). MSC: 81P94 94A60 81P70 81P68 70F10 68Q12 81Q93 PDFBibTeX XMLCite \textit{J. Bartusek}, Lect. Notes Comput. Sci. 13042, 1--30 (2021; Zbl 1520.81045) Full Text: DOI
Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram On the round complexity of black-box secure MPC. (English) Zbl 1486.94111 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021). MSC: 94A60 68M12 68M14 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 12826, 214--243 (2021; Zbl 1486.94111) Full Text: DOI
Gentry, Craig; Halevi, Shai; Krawczyk, Hugo; Magri, Bernardo; Nielsen, Jesper Buus; Rabin, Tal; Yakoubov, Sophia YOSO: You only speak once. Secure MPC with stateless ephemeral roles. (English) Zbl 1486.94102 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 64-93 (2021). MSC: 94A60 68Q25 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 12826, 64--93 (2021; Zbl 1486.94102) Full Text: DOI
Devevey, Julien; Libert, Benoît; Nguyen, Khoa; Peters, Thomas; Yung, Moti Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings. (English) Zbl 1479.94154 Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 659-690 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Devevey} et al., Lect. Notes Comput. Sci. 12710, 659--690 (2021; Zbl 1479.94154) Full Text: DOI Link
Wee, Hoeteck; Wichs, Daniel Candidate obfuscation via oblivious LWE sampling. (English) Zbl 1479.94270 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 127-156 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 12698, 127--156 (2021; Zbl 1479.94270) Full Text: DOI
Couteau, Geoffroy; Meyer, Pierre Breaking the circuit size barrier for secure computation under quasi-polynomial LPN. (English) Zbl 07440629 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 842-870 (2021). MSC: 68P25 94A62 94A60 PDFBibTeX XMLCite \textit{G. Couteau} and \textit{P. Meyer}, Lect. Notes Comput. Sci. 12697, 842--870 (2021; Zbl 07440629) Full Text: DOI HAL
Benhamouda, Fabrice; Jain, Aayush; Komargodski, Ilan; Lin, Huijia Multiparty reusable non-interactive secure computation from LWE. (English) Zbl 07440625 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 724-753 (2021). MSC: 68P25 68Mxx 94A60 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 12697, 724--753 (2021; Zbl 07440625) Full Text: DOI
Agarwal, Amit; Bartusek, James; Goyal, Vipul; Khurana, Dakshita; Malavolta, Giulio Post-quantum multi-party computation. (English) Zbl 07440588 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 435-464 (2021). MSC: 68Mxx 68P25 94A60 81P94 PDFBibTeX XMLCite \textit{A. Agarwal} et al., Lect. Notes Comput. Sci. 12696, 435--464 (2021; Zbl 07440588) Full Text: DOI arXiv
Libert, Benoît; Ling, San; Mouhartem, Fabrice; Nguyen, Khoa; Wang, Huaxiong Adaptive oblivious transfer with access control from lattice assumptions. (English) Zbl 1517.94124 Theor. Comput. Sci. 891, 210-229 (2021). MSC: 94A60 68Q10 68P05 68P10 PDFBibTeX XMLCite \textit{B. Libert} et al., Theor. Comput. Sci. 891, 210--229 (2021; Zbl 1517.94124) Full Text: DOI Link
Orsini, Emmanuela Efficient, actively secure MPC with a dishonest majority: a survey. (English) Zbl 07405934 Bajard, Jean Claude (ed.) et al., Arithmetic of finite fields. 8th international workshop, WAIFI 2020, Rennes, France, July 6–8, 2020. Revised selected and invited papers. Cham: Springer. Lect. Notes Comput. Sci. 12542, 42-71 (2021). MSC: 68P25 68Mxx 94A60 11T71 PDFBibTeX XMLCite \textit{E. Orsini}, Lect. Notes Comput. Sci. 12542, 42--71 (2021; Zbl 07405934) Full Text: DOI
Patra, Arpita; Ravi, Divya On the exact round complexity of secure three-party computation. (English) Zbl 1472.94059 J. Cryptology 34, No. 4, Paper No. 40, 77 p. (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Patra} and \textit{D. Ravi}, J. Cryptology 34, No. 4, Paper No. 40, 77 p. (2021; Zbl 1472.94059) Full Text: DOI
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan Round-optimal secure multi-party computation. (English) Zbl 1469.94101 J. Cryptology 34, No. 3, Paper No. 19, 63 p. (2021). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Halevi} et al., J. Cryptology 34, No. 3, Paper No. 19, 63 p. (2021; Zbl 1469.94101) Full Text: DOI
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis Round-preserving parallel composition of probabilistic-termination cryptographic protocols. (English) Zbl 1515.68139 J. Cryptology 34, No. 2, Paper No. 12, 58 p. (2021). MSC: 68Q10 68M12 94A60 94A62 PDFBibTeX XMLCite \textit{R. Cohen} et al., J. Cryptology 34, No. 2, Paper No. 12, 58 p. (2021; Zbl 1515.68139) Full Text: DOI Link
Liu-Zhang, Chen-Da; Loss, Julian; Maurer, Ueli; Moran, Tal; Tschudi, Daniel MPC with synchronous security and asynchronous responsiveness. (English) Zbl 1511.94131 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 92-119 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{C.-D. Liu-Zhang} et al., Lect. Notes Comput. Sci. 12493, 92--119 (2020; Zbl 1511.94131) Full Text: DOI
Patra, Arpita; Ravi, Divya; Singla, Swati On the exact round complexity of best-of-both-worlds multi-party computation. (English) Zbl 07669167 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 60-91 (2020). MSC: 68P25 68Mxx 94A60 PDFBibTeX XMLCite \textit{A. Patra} et al., Lect. Notes Comput. Sci. 12493, 60--91 (2020; Zbl 07669167) Full Text: DOI
Chakraborty, Suvradip; Dziembowski, Stefan; Nielsen, Jesper Buus Reverse firewalls for actively secure MPCs. (English) Zbl 1504.94117 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12171, 732-762 (2020). MSC: 94A60 68P25 68M25 PDFBibTeX XMLCite \textit{S. Chakraborty} et al., Lect. Notes Comput. Sci. 12171, 732--762 (2020; Zbl 1504.94117) Full Text: DOI
Cohen, Ran; Garay, Juan; Zikas, Vassilis Broadcast-optimal two-round MPC. (English) Zbl 1492.94083 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 828-858 (2020). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{R. Cohen} et al., Lect. Notes Comput. Sci. 12106, 828--858 (2020; Zbl 1492.94083) Full Text: DOI
Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio Candidate iO from homomorphic encryption schemes. (English) Zbl 1479.94137 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 79-109 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., Lect. Notes Comput. Sci. 12105, 79--109 (2020; Zbl 1479.94137) Full Text: DOI
Kim, Eunkyung; Lee, Hyang-Sook; Park, Jeongeun Towards round-optimal secure multiparty computations: multikey FHE without a CRS. (English) Zbl 1458.68068 Int. J. Found. Comput. Sci. 31, No. 2, 157-174 (2020). MSC: 68Q10 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{E. Kim} et al., Int. J. Found. Comput. Sci. 31, No. 2, 157--174 (2020; Zbl 1458.68068) Full Text: DOI
Kim, Sam; Wu, David J. Multi-theorem preprocessing NIZKs from lattices. (English) Zbl 1457.94151 J. Cryptology 33, No. 3, 619-702 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Kim} and \textit{D. J. Wu}, J. Cryptology 33, No. 3, 619--702 (2020; Zbl 1457.94151) Full Text: DOI
Rathee, Deevashwer; Schneider, Thomas; Shukla, K. K. Improved multiplication triple generation over rings via RLWE-based AHE. (English) Zbl 1457.94175 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 347-359 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Rathee} et al., Lect. Notes Comput. Sci. 11829, 347--359 (2019; Zbl 1457.94175) Full Text: DOI Link
Ananth, Prabhanjan; Badrinarayanan, Saikrishna; Jain, Aayush; Manohar, Nathan; Sahai, Amit From FE combiners to secure MPC and back. (English) Zbl 1455.94108 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 199-228 (2019). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 11891, 199--228 (2019; Zbl 1455.94108) Full Text: DOI
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis Probabilistic termination and composability of cryptographic protocols. (English) Zbl 1466.94022 J. Cryptology 32, No. 3, 690-741 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., J. Cryptology 32, No. 3, 690--741 (2019; Zbl 1466.94022) Full Text: DOI
Wang, Huiyong; Feng, Yong; Ding, Yong; Tang, Shijie A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE. (English) Zbl 1415.94464 Soft Comput. 23, No. 5, 1735-1744 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wang} et al., Soft Comput. 23, No. 5, 1735--1744 (2019; Zbl 1415.94464) Full Text: DOI
Dolev, Shlomi; Garay, Juan A.; Gilboa, Niv; Kolesnikov, Vladimir; Kumaramangalam, Muni Venkateswarlu Perennial secure multi-party computation of universal Turing machine. (English) Zbl 1421.68047 Theor. Comput. Sci. 769, 43-62 (2019). MSC: 68Q05 68Q10 94A62 PDFBibTeX XMLCite \textit{S. Dolev} et al., Theor. Comput. Sci. 769, 43--62 (2019; Zbl 1421.68047) Full Text: DOI
Boyle, Elette; Jain, Abhishek; Prabhakaran, Manoj; Yu, Ching-Hua The bottleneck complexity of secure multiparty computation. (English) Zbl 1499.68119 Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 24, 16 p. (2018). MSC: 68Q11 68Q10 94A60 PDFBibTeX XMLCite \textit{E. Boyle} et al., LIPIcs -- Leibniz Int. Proc. Inform. 107, Article 24, 16 p. (2018; Zbl 1499.68119) Full Text: DOI
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Lin, Huijia; Tessaro, Stefano Foundations of homomorphic secret sharing. (English) Zbl 1462.94053 Karlin, Anna R. (ed.), 9th innovations in theoretical computer science conference, ITCS 2018, Cambridge, MA, USA, January 11–14, 2018. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 94, Article 21, 21 p. (2018). MSC: 94A62 68Q11 PDFBibTeX XMLCite \textit{E. Boyle} et al., LIPIcs -- Leibniz Int. Proc. Inform. 94, Article 21, 21 p. (2018; Zbl 1462.94053) Full Text: DOI
Benhamouda, Fabrice; Lin, Huijia; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan Two-round adaptively secure multiparty computation from standard assumptions. (English) Zbl 1443.94046 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 175-205 (2018). MSC: 94A60 68Q06 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 11239, 175--205 (2018; Zbl 1443.94046) Full Text: DOI
LaVigne, Rio; Liu-Zhang, Chen-Da; Maurer, Ueli; Moran, Tal; Mularczyk, Marta; Tschudi, Daniel Topology-hiding computation beyond semi-honest adversaries. (English) Zbl 1430.94078 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 3-35 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. LaVigne} et al., Lect. Notes Comput. Sci. 11240, 3--35 (2018; Zbl 1430.94078) Full Text: DOI
Wei, Xiaochao; Zhao, Minghao; Xu, Qiuliang Efficient and secure outsourced approximate pattern matching protocol. (English) Zbl 1398.68710 Soft Comput. 22, No. 4, 1175-1187 (2018). MSC: 68W32 68M12 94A62 PDFBibTeX XMLCite \textit{X. Wei} et al., Soft Comput. 22, No. 4, 1175--1187 (2018; Zbl 1398.68710) Full Text: DOI
Damgård, Ivan; Orlandi, Claudio; Simkin, Mark Yet another compiler for active security or: efficient MPC over arbitrary rings. (English) Zbl 1436.94050 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 799-829 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Damgård} et al., Lect. Notes Comput. Sci. 10992, 799--829 (2018; Zbl 1436.94050) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Garg, Sanjam; Holmgren, Justin; Jain, Abhishek; Lin, Huijia; Pass, Rafael; Telang, Sidharth; Vaikuntanathan, Vinod Indistinguishability obfuscation for RAM programs and succinct randomized encodings. (English) Zbl 1396.68041 SIAM J. Comput. 47, No. 3, 1123-1210 (2018). MSC: 68P25 68Q10 68W20 PDFBibTeX XMLCite \textit{N. Bitansky} et al., SIAM J. Comput. 47, No. 3, 1123--1210 (2018; Zbl 1396.68041) Full Text: DOI
Dulek, Yfke; Schaffner, Christian; Speelman, Florian Quantum homomorphic encryption for polynomial-size circuits. (English) Zbl 1408.94933 Theory Comput. 14, Paper No. 7, 45 p. (2018). MSC: 94A60 81P68 81P94 PDFBibTeX XMLCite \textit{Y. Dulek} et al., Theory Comput. 14, Paper No. 7, 45 p. (2018; Zbl 1408.94933) Full Text: DOI arXiv
López-Alt, Adriana; Tromer, Eran; Vaikuntanathan, Vinod Multikey fully homomorphic encryption and applications. (English) Zbl 1382.68058 SIAM J. Comput. 46, No. 6, 1827-1892 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. López-Alt} et al., SIAM J. Comput. 46, No. 6, 1827--1892 (2017; Zbl 1382.68058) Full Text: DOI
Boyle, Elette; Gilboa, Niv; Ishai, Yuval Group-based secure computation: optimizing rounds, communication, and computation. (English) Zbl 1415.94414 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 163-193 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 10211, 163--193 (2017; Zbl 1415.94414) Full Text: DOI
Chongchitmate, Wutichai; Ostrovsky, Rafail Circuit-private multi-key FHE. (English) Zbl 1400.94136 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 241-270 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Chongchitmate} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 10175, 241--270 (2017; Zbl 1400.94136) Full Text: DOI
Shinagawa, Kazumasa; Nuida, Koji; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Size-hiding computation for multiple parties. (English) Zbl 1407.94151 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 937-966 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 10032, 937--966 (2016; Zbl 1407.94151) Full Text: DOI
Libert, Benoît; Ling, San; Mouhartem, Fabrice; Nguyen, Khoa; Wang, Huaxiong Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions. (English) Zbl 1407.94136 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 373-403 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 10032, 373--403 (2016; Zbl 1407.94136) Full Text: DOI Link
Peikert, Chris; Shiehian, Sina Multi-key FHE from LWE, revisited. (English) Zbl 1397.94093 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 217-238 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Peikert} and \textit{S. Shiehian}, Lect. Notes Comput. Sci. 9986, 217--238 (2016; Zbl 1397.94093) Full Text: DOI
Baum, Carsten; Orsini, Emmanuela; Scholl, Peter Efficient secure multiparty computation with identifiable abort. (English) Zbl 1406.94025 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 461-490 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Baum} et al., Lect. Notes Comput. Sci. 9985, 461--490 (2016; Zbl 1406.94025) Full Text: DOI Link
Boyle, Elette; Gilboa, Niv; Ishai, Yuval Breaking the circuit size barrier for secure computation under DDH. (English) Zbl 1384.94038 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 509-539 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 9814, 509--539 (2016; Zbl 1384.94038) Full Text: DOI
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis Probabilistic termination and composability of cryptographic protocols. (English) Zbl 1406.94040 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 240-269 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., Lect. Notes Comput. Sci. 9816, 240--269 (2016; Zbl 1406.94040) Full Text: DOI
Dulek, Yfke; Schaffner, Christian; Speelman, Florian Quantum homomorphic encryption for polynomial-sized circuits. (English) Zbl 1406.94047 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 3-32 (2016). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Y. Dulek} et al., Lect. Notes Comput. Sci. 9816, 3--32 (2016; Zbl 1406.94047) Full Text: DOI arXiv
Hazay, Carmit; Zarosim, Hila The feasibility of outsourced database search in the plain model. (English) Zbl 1478.68075 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 313-332 (2016). MSC: 68P15 68M12 68M14 68M25 PDFBibTeX XMLCite \textit{C. Hazay} and \textit{H. Zarosim}, Lect. Notes Comput. Sci. 9841, 313--332 (2016; Zbl 1478.68075) Full Text: DOI
Choudhury, Ashish; Orsini, Emmanuela; Patra, Arpita; Smart, Nigel P. Linear overhead optimally-resilient robust MPC using preprocessing. (English) Zbl 1400.68084 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 147-168 (2016). MSC: 68Q25 94A60 PDFBibTeX XMLCite \textit{A. Choudhury} et al., Lect. Notes Comput. Sci. 9841, 147--168 (2016; Zbl 1400.68084) Full Text: DOI Link
Varnovsky, N. P.; Zakharov, V. A.; Shokurov, A. V. On the existence of provably secure cloud computing systems. (English. Russian original) Zbl 1369.68199 Mosc. Univ. Comput. Math. Cybern. 40, No. 2, 83-88 (2016); translation from Vestn. Mosk. Univ., Ser. XV 2016, No. 2, 32-37 (2016). MSC: 68P25 68M11 94A60 PDFBibTeX XMLCite \textit{N. P. Varnovsky} et al., Mosc. Univ. Comput. Math. Cybern. 40, No. 2, 83--88 (2016; Zbl 1369.68199); translation from Vestn. Mosk. Univ., Ser. XV 2016, No. 2, 32--37 (2016) Full Text: DOI
Lee, Hyung Tae; Ling, San; Wang, Huaxiong Analysis of Gong et al.’s CCA2-secure homomorphic encryption. (English) Zbl 1348.94065 Theor. Comput. Sci. 640, 104-114 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. T. Lee} et al., Theor. Comput. Sci. 640, 104--114 (2016; Zbl 1348.94065) Full Text: DOI
Gong, Linming; Li, Shundong; Mao, Qing; Wang, Daoshun; Dou, Jiawei A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle. (English) Zbl 1348.94051 Theor. Comput. Sci. 609, Part 1, 253-261 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Gong} et al., Theor. Comput. Sci. 609, Part 1, 253--261 (2016; Zbl 1348.94051) Full Text: DOI
Varnovskiy, N. P.; Martishin, S. A.; Khrapchenko, M. V.; Shokurov, A. V. Secure cloud computing based on threshold homomorphic encryption. (English) Zbl 1370.94547 Program. Comput. Softw. 41, No. 4, 215-218 (2015); translation from Programmirovanie 41, No. 4 (2015). MSC: 94A60 68M11 68P25 PDFBibTeX XMLCite \textit{N. P. Varnovskiy} et al., Program. Comput. Softw. 41, No. 4, 215--218 (2015; Zbl 1370.94547); translation from Programmirovanie 41, No. 4 (2015) Full Text: DOI
Boyle, Elette; Chung, Kai-Min; Pass, Rafael Large-scale secure computation: multi-party computation for (parallel) RAM programs. (English) Zbl 1352.94027 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 742-762 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 9216, 742--762 (2015; Zbl 1352.94027) Full Text: DOI
Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat Secure computation with minimal interaction, revisited. (English) Zbl 1352.94075 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 359-378 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 9216, 359--378 (2015; Zbl 1352.94075) Full Text: DOI
Ling, San; Nguyen, Khoa; Stehlé, Damien; Wang, Huaxiong Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. (English) Zbl 1314.94087 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 107-124 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Ling} et al., Lect. Notes Comput. Sci. 7778, 107--124 (2013; Zbl 1314.94087) Full Text: DOI