Abstract | ||
---|---|---|
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al. [EUROCRYPT 2011] studies the following problem: Suppose a receiver R wishes to publish an encryption of her secret input y so that any sender S with input x can then send a message m that reveals f(x, y) to R (for some function f). Here, m can be viewed as an encryption of f(x, y) that can be decrypted by R. NISC requires security against both malicious senders and receivers, and also requires the receiver’s message to be reusable across multiple computations (w.r.t. a fixed input of the receiver). |
Year | Venue | DocType |
---|---|---|
2018 | ASIACRYPT | Journal |
Volume | Citations | PageRank |
2018 | 0 | 0.34 |
References | Authors | |
19 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Saikrishna Badrinarayanan | 1 | 63 | 11.17 |
Abhishek Jain | 2 | 879 | 48.25 |
Rafail Ostrovsky | 3 | 8743 | 588.15 |
Ivan Visconti | 4 | 612 | 40.30 |