Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
2
views
40
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,369
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security : 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
other
Author(s):
Kittiphop Phalakarn
,
Nuttapong Attrapadung
,
Kanta Matsuura
Publication date
(Online):
June 18 2022
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Behavioral Economics of Music: A Framework for the Study of Music Listening, Evaluation, and Choice Behavior
Most cited references
40
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Protocols for secure computations
Andrew Yao
(1982)
0
comments
Cited
101
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Proof of Security of Yao’s Protocol for Two-Party Computation
Benny Pinkas
,
Yehuda Lindell
(2009)
0
comments
Cited
74
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
How to construct random functions
Oded Goldreich
,
Shafi Goldwasser
,
Silvio Micali
(1986)
0
comments
Cited
65
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
June 18 2022
Pages
: 605-625
DOI:
10.1007/978-3-031-09234-3_30
SO-VID:
6ad986d8-fc4e-4202-a2cf-83b816b7fb56
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
pp. 24
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
pp. 45
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
pp. 67
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
pp. 85
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
pp. 105
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
pp. 126
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
pp. 147
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
pp. 170
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
pp. 193
RSA Key Recovery from Digit Equivalence Information
pp. 212
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
pp. 230
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
pp. 253
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
pp. 273
Improving the Privacy of Tor Onion Services
pp. 293
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
pp. 313
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
pp. 337
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
pp. 356
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
pp. 376
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
pp. 399
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
pp. 419
Don’t Tamper with Dual System Encryption
pp. 440
Progressive and Efficient Verification for Digital Signatures
pp. 459
Revocable Hierarchical Attribute-Based Signatures from Lattices
pp. 480
Covert Authentication from Lattices
pp. 501
Spreading the Privacy Blanket:
pp. 521
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
pp. 542
(Commit-and-Prove) Predictable Arguments with Privacy
pp. 565
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
pp. 585
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
pp. 605
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
pp. 626
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
pp. 643
Efficient Two-Party Exponentiation from Quotient Transfer
pp. 663
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
pp. 684
How Byzantine is a Send Corruption?
pp. 707
Babel Fees via Limited Liabilities
pp. 727
FAST: Fair Auctions via Secret Transactions
pp. 748
Astrape: Anonymous Payment Channels with Boring Cryptography
pp. 771
A White-Box Speck Implementation Using Self-equivalence Encodings
pp. 792
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
pp. 809
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher
pp. 833
Carry-Less to BIKE Faster
pp. 853
Faster Kyber and Dilithium on the Cortex-M4
pp. 872
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
pp. 892
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Similar content
2,369
25 Jahre Getreideforschung an der DFA 1975–1999
Authors:
H Wieser
Intrinsic Dynamic Nature of Neutral Hydrogen Bonds Elucidated with QTAIM Dual Functional Analysis: Role of the Compliance Force Constants and QTAIM‐DFA Parameters in Stability
Authors:
Taro Nishide
,
Satoko Hayashi
,
Waro Nakanishi
Multi-response optimization for machining GFRP composites using GRA and DFA
Authors:
N. Neeli
,
M.P. Jenarthanan
,
D. KUMAR
See all similar