Sciweavers

TCC
2016
Springer
101views Cryptology» more  TCC 2016»
8 years 15 days ago
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser, Yael Tauman Kalai
TCC
2016
Springer
77views Cryptology» more  TCC 2016»
8 years 15 days ago
On the Complexity of Additively Homomorphic UC Commitments
We present a new constant round additively homomorphic commitment scheme with (amortized) computational and communication complexity linear in the size of the string committed to. ...
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jespe...
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
8 years 15 days ago
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
TCC
2016
Springer
61views Cryptology» more  TCC 2016»
8 years 15 days ago
Homomorphic Evaluation Requires Depth
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented ...
Andrej Bogdanov, Chin Ho Lee
Cryptology
Top of PageReset Settings