Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
12
views
50
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,106
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration
other
Author(s):
Shweta Agrawal
,
Yuval Ishai
,
Eyal Kushilevitz
,
Varun Narayanan
,
Manoj Prabhakaran
,
Vinod Prabhakaran
,
Alon Rosen
Publication date
(Online):
August 11 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scholarly Communication
Most cited references
50
Record
: found
Abstract
: not found
Article
: not found
The Wire-Tap Channel
A. D. Wyner
(1975)
0
comments
Cited
879
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Generalized privacy amplification
C.H. Bennett
,
G. Brassard
,
C. Crepeau
…
(1995)
0
comments
Cited
308
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
August 11 2021
Pages
: 124-154
DOI:
10.1007/978-3-030-84245-1_5
SO-VID:
684609ca-4f04-45cb-a95c-230a27cd4b7f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election
pp. 33
Computational Hardness of Optimal Fair Computation: Beyond Minicrypt
pp. 64
YOSO: You Only Speak Once
pp. 94
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
pp. 124
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration
pp. 155
Broadcast-Optimal Two Round MPC with an Honest Majority
pp. 185
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
pp. 214
On the Round Complexity of Black-Box Secure MPC
pp. 244
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
pp. 275
Unconditional Communication-Efficient MPC via Hall’s Marriage Theorem
pp. 305
Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions
pp. 335
Efficient Information-Theoretic Multi-party Computation over Non-commutative Rings
pp. 365
Pushing the Limits of Valiant’s Universal Circuits: Simpler, Tighter and More Compact
pp. 395
Oblivious Key-Value Stores and Amplification for Private Set Intersection
pp. 426
MHz2k: MPC from HE over \(\mathbb {Z}_{2^k}\) with New Packing, Simpler Reshare, and Better ZKP
pp. 457
Sublinear GMW-Style Compiler for MPC with Preprocessing
pp. 486
Limits on the Adaptive Security of Yao’s Garbling
pp. 519
Subtractive Sets over Cyclotomic Rings
pp. 549
A Compressed \(\varSigma \)-Protocol Theory for Lattices
pp. 580
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
pp. 641
Deniable Fully Homomorphic Encryption from Learning with Errors
pp. 673
Counterexamples to New Circular Security Assumptions Underlying iO
pp. 701
How to Meet Ternary LWE Keys
pp. 732
Lattice Reduction with Approximate Enumeration Oracles
pp. 760
Towards Faster Polynomial-Time Lattice Reduction
pp. 791
Lower Bounds on Lattice Sieving and Information Set Decoding
Similar content
2,106
Ideal Quantum Communication over Noisy Channels: a Quantum Optical Implementation
Authors:
P. Zoller
,
J Cirac
,
S van Enk
CASPIANET++: A multidimensional Channel-Spatial Asymmetric attention network with Noisy Student Curriculum Learning paradigm for brain tumor segmentation
Authors:
Andrea Liew
,
Chun Lee
,
Boon Lan
…
Deep Learning Algorithms based Voiceprint Recognition System in Noisy Environment
Authors:
Hajer Y. Khdier
,
Wesam Jasim
,
Salah A. Aliesawi
See all similar
Cited by
1
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration
Authors:
Shweta Agrawal
,
Yuval Ishai
,
Eyal Kushilevitz
…
See all cited by