Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security | 0 | 0.34 | 2022 |
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security. | 0 | 0.34 | 2022 |
Updatable Private Set Intersection. | 0 | 0.34 | 2022 |
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets. | 0 | 0.34 | 2022 |
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. | 0 | 0.34 | 2022 |
Secret-Shared Joins with Multiplicity from Aggregation Trees | 0 | 0.34 | 2022 |
Statistical Security in Two-Party Computation Revisited. | 0 | 0.34 | 2022 |
Updatable Private Set Intersection. | 0 | 0.34 | 2021 |
Reusable Two-Round MPC from DDH. | 0 | 0.34 | 2020 |
Secure MPC: Laziness Leads to GOD. | 0 | 0.34 | 2020 |
Statistical ZAP Arguments. | 0 | 0.34 | 2019 |
Promise Zero Knowledge and its Applications to Round Optimal MPC. | 3 | 0.37 | 2018 |
Non-interactive Secure Computation from One-Way Functions. | 0 | 0.34 | 2018 |
Secure MPC: Laziness Leads to GOD. | 0 | 0.34 | 2018 |
Revisiting Non-Malleable Secret Sharing. | 2 | 0.36 | 2018 |
Succinct delegation for low-space non-deterministic computation. | 0 | 0.34 | 2018 |
A note on VRFs from Verifiable Functional Encryption. | 0 | 0.34 | 2017 |
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. | 1 | 0.35 | 2017 |
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. | 0 | 0.34 | 2017 |
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs. | 2 | 0.36 | 2017 |
Round Optimal Concurrent MPC via Strong Simulation. | 3 | 0.38 | 2017 |
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. | 20 | 0.66 | 2016 |
Verifiable Functional Encryption. | 4 | 0.40 | 2016 |
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs. | 0 | 0.34 | 2016 |
Big Data Analytics over Encrypted Datasets with Seabed. | 10 | 0.47 | 2016 |
Post-Zeroizing Obfuscation: The case of Evasive Circuits. | 0 | 0.34 | 2015 |
Multi-Input Functional Encryption for Unbounded Arity Functions. | 0 | 0.34 | 2015 |
Certificateless and Identity based Authenticated Key Exchange Protocols. | 0 | 0.34 | 2014 |
A Revocable Online-Offline Certificateless Signature Scheme without Pairing. | 0 | 0.34 | 2013 |
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. | 18 | 0.72 | 2013 |