Zobrazeno 1 - 10
of 145
pro vyhledávání: '"Sophia Yakoubov"'
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9f3d5962a579ed8906a8cd8d18c3dae
https://doi.org/10.1007/978-3-031-30617-4_5
https://doi.org/10.1007/978-3-031-30617-4_5
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::217037f95a5c1c8ad6d83292b0dc3900
https://doi.org/10.1007/978-3-031-14791-3_22
https://doi.org/10.1007/978-3-031-14791-3_22
Publikováno v:
Public-Key Cryptography – PKC 2022 ISBN: 9783030971304
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78ea9c8cd402e7a94ca3d5e8a9d1f3ad
https://doi.org/10.1007/978-3-030-97131-1_13
https://doi.org/10.1007/978-3-030-97131-1_13
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3dfa067af15f2779223dbf80faf3239b
https://doi.org/10.1007/978-3-031-14791-3_17
https://doi.org/10.1007/978-3-031-14791-3_17
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::81e5779b047fc37d731a9ad7edbcae79
https://doi.org/10.1007/978-3-031-06944-4_27
https://doi.org/10.1007/978-3-031-06944-4_27
Publikováno v:
Gentry, C, Halevi, S, Magri, B, Nielsen, J B & Yakoubov, S 2021, Random-Index PIR and Applications . in K Nissim & B Waters (eds), Theory of Cryptography-19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III . vol. 13044, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13044 LNCS, Springer Berlin, pp. 32-61 . https://doi.org/10.1007/978-3-030-90456-2_2
Theory of Cryptography ISBN: 9783030904555
TCC (3)
Theory of Cryptography ISBN: 9783030904555
TCC (3)
Private information retrieval (PIR) lets a client retrieve an entry from a database without the server learning which entry was retrieved. Here we study a weaker variant that we call random-index PIR (RPIR), where the retrieved index is an output rat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c38c200613ed8d8689315d5f3b1d286a
https://eprint.iacr.org/2020/1248.pdf
https://eprint.iacr.org/2020/1248.pdf
Publikováno v:
Advances in Cryptology – CRYPTO 2021-41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
This paper closes the question of the possibility of two-round MPC protocols achieving different security guarantees with and without the availability of broadcast in any given round. Cohen et al. [CGZ20] study this question in the dishonest majority
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030780852
CSCML
CSCML
In a public-key threshold encryption scheme, the sender produces a single ciphertext, and any \(t+1\) out of \(n\) intended recipients can combine their partial decryptions to obtain the plaintext. Ad hoc threshold encryption (ATE) schemes require no
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::43a691d81e08c73b6ce09f3c9e257d04
https://doi.org/10.1007/978-3-030-78086-9_27
https://doi.org/10.1007/978-3-030-78086-9_27
Publikováno v:
Progress in Cryptology – LATINCRYPT 2021 ISBN: 9783030882372
LATINCRYPT
LATINCRYPT
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c80e6f8cc2f647a7c0e1688137edb74
https://doi.org/10.1007/978-3-030-88238-9_18
https://doi.org/10.1007/978-3-030-88238-9_18
Autor:
Craig Gentry, Tal Rabin, Hugo Krawczyk, Sophia Yakoubov, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
CRYPTO (2)
The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4c430f2ed4f67de48fb90e8811248ba3
https://doi.org/10.1007/978-3-030-84245-1_3
https://doi.org/10.1007/978-3-030-84245-1_3