We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 157 results
  1. Must the Communication Graph of MPC Protocols be an Expander?

    Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) where a partial network is...

    Elette Boyle, Ran Cohen, ... Pavel Hubáček in Journal of Cryptology
    Article 10 May 2023
  2. Explicit Non-malleable Codes from Bipartite Graphs

    Non-malleable codes are introduced to protect the communication against adversarial tampering of data, as a relaxation of the error-correcting codes...
    Shohei Satake, Yujie Gu, Kouichi Sakurai in Arithmetic of Finite Fields
    Conference paper 2023
  3. Testing Higher-Order Clusterability on Graphs

    Analysis of higher-order organizations, usually small connected subgraphs called motifs, is a fundamental task on complex networks. This paper...
    Yifei Li, Donghua Yang, Jianzhong Li in Combinatorial Optimization and Applications
    Conference paper 2024
  4. Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN

    The recent development of pseudorandom correlation generators (PCG) holds tremendous promise for highly efficient MPC protocols. Among other...
    Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  5. Deterministic near-optimal distributed listing of cliques

    The importance of classifying connections in large graphs has been the motivation for a rich line of work on distributed subgraph finding that has...

    Keren Censor-Hillel, Dean Leitersdorf, David Vulakh in Distributed Computing
    Article 20 June 2024
  6. Graphs in the Bounded-Degree Model

    In this chapter, we study testing properties of graphs in the bounded-degree model. This model is parameterized by an integer...
    Arnab Bhattacharyya, Yuichi Yoshida in Property Testing
    Chapter 2022
  7. Leader Election in Well-Connected Graphs

    In this paper, we look at the problem of randomized leader election in synchronous distributed networks with a special focus on the message...

    Seth Gilbert, Peter Robinson, Suman Sourav in Algorithmica
    Article 24 November 2022
  8. New Constructions of Collapsing Hashes

    Collapsing is a post-quantum strengthening of collision resistance, needed to lift many classical results to the quantum setting. Unfortunately, the...
    Conference paper 2022
  9. Accelerated Information Dissemination on Networks with Local and Global Edges

    Bootstrap percolation is a classical model for the spread of information in a network. In the round-based version, nodes of an undirected graph...
    Sarel Cohen, Philipp Fischbeck, ... Thomas Sauerwald in Structural Information and Communication Complexity
    Conference paper 2022
  10. Cayley sum graphs and their applications to codebooks

    In this paper we first provide two new constructions for Cayley sum graphs, namely, norm-coset graphs and trace-coset graphs, and determine their...

    Shohei Satake, Yujie Gu in Designs, Codes and Cryptography
    Article 20 November 2022
  11. Sublinear-time distributed algorithms for detecting small cliques and even cycles

    Talya Eden, Nimrod Fiat, ... Rotem Oshman in Distributed Computing
    Article 26 November 2021
  12. An Evolving Network Model from Clique Extension

    We consider a new model for complex networks whose underlying mechanism is extending dense subgraphs. In the frustum model, we iteratively extend...
    Anthony Bonato, Ryan Cushman, ... Zhiyuan Zhang in Computing and Combinatorics
    Conference paper 2022
  13. Zeros and approximations of Holant polynomials on the complex plane

    We present fully polynomial time approximation schemes for a broad class of Holant problems with complex edge weights, which we call Holant polynomials ...

    Katrin Casel, Philipp Fischbeck, ... J. A. Gregor Lagodzinski in computational complexity
    Article Open access 27 July 2022
  14. Majority opinion diffusion: when tie-breaking rule matters

    Consider a graph G , which represents a social network, and assume that initially each node is either blue or white (corresponding to its opinion on a...

    Article Open access 20 May 2024
  15. Explicit Correlation Amplifiers for Finding Outlier Correlations in Deterministic Subquadratic Time

    We derandomize Valiant’s (J ACM 62, Article 13, 2015) subquadratic-time algorithm for finding outlier correlations in binary data. This demonstrates...

    Matti Karppa, Petteri Kaski, ... Padraig Ó Catháin in Algorithmica
    Article Open access 20 June 2020
  16. Séta: Supersingular Encryption from Torsion Attacks

    We present Séta (To be pronounced [ʃe:tɒ] meaning “walk” in Hungarian.), a new family of public-key encryption schemes with post-quantum security...
    Luca De Feo, Cyprien Delpech de Saint Guilhem, ... Benjamin Wesolowski in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  17. Bridging a Small Gap in the Gap Amplification of Assignment Testers

    Irit Dinur’s proof of the PCP theorem via gap amplification (J. ACM, Vol. 54 (3) and ECCC TR05-046) has an important extension to Assignment Testers...
    Chapter 2020
  18. Oblivious Tight Compaction In O(n) Time with Smaller Constant

    Oblivious compaction is a crucial building block for hash-based oblivious RAM. Asharov et al. recently gave a O(n) algorithm for oblivious tight...
    Sam Dittmer, Rafail Ostrovsky in Security and Cryptography for Networks
    Conference paper 2020
Did you find what you were looking for? Share feedback.