Back to Results
First PageMeta Content
Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce


Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡
Add to Reading List

Document Date: 2015-04-14 07:10:50


Open Document

File Size: 933,16 KB

Share Result on Facebook

Company

Microsoft / /

/

Facility

Check Point Institute / Tel-Aviv University / /

IndustryTerm

online communication complexity / low online complexity / generation algorithm / zero-knowledge protocols / secure computation protocol / online efficiency / secure computation protocols / online/offline model / high online communication complexity / semi-honest protocols / secure multiparty protocols / decryption algorithm / arithmetic semi-honest protocol / online phase / computing / online communication / classical information-theoretic secure multiparty protocols / encryption algorithm / semi-honest secure computation protocols / /

Organization

Check Point Institute for Information Security / Israel Ministry of Science and Technology / Tel-Aviv University / School of Electrical Engineering / /

Person

Benny Applebaum† Jonathan Avron / Christina Brzuska / /

Position

model for various cryptographic tasks / arithmetic model to the Generic Group / General / /

PublishedMedium

Theoretical Computer Science / /

Technology

encryption / 54 10 Encryption / semi-honest secure two-party protocols / semi-honest secure computation protocols / Cryptography / Strongly Homomorphic Encryption / symmetric encryption / GIF / key generation algorithm / public key / secure two-party protocols / public-key encryption / encryption algorithm / underlying encryption / Free Commitment Protocol / Multiplicative Homomorphic Encryption / secure computation protocols / LPN-based encryption / semi-honest protocols / multiplicative-homomorphic encryption / arithmetic semi-honest protocol / zero-knowledge protocols / classical information-theoretic secure multiparty protocols / secure computation protocol / decryption algorithm / 10.1 One-Time Secure Arithmetic/Binary Encryption / key-generation algorithm / secure multiparty protocols / 7 Homomorphic Encryption / fresh encryption / One-time encryption / Public Key Encryption / /

SocialTag