|
1 Garbled Circuits as Randomized Encodings of Functions: a Primer |
|
|
1 | (44) |
|
|
|
1 | (3) |
|
1.2 Definitions and Basic Properties |
|
|
4 | (6) |
|
|
10 | (9) |
|
1.4 Advanced Constructions |
|
|
19 | (12) |
|
|
31 | (4) |
|
1.6 Summary and Suggestions for Further Reading |
|
|
35 | (2) |
|
1.7 Appendix: Randomized Encodings Versus Garbling Schemes [ 26] |
|
|
37 | (8) |
|
|
38 | (7) |
|
2 The Complexity of Public-Key Cryptography |
|
|
45 | (34) |
|
|
|
45 | (4) |
|
2.2 Private-Key Cryptography |
|
|
49 | (6) |
|
2.3 Public-Key Cryptography: an Overview |
|
|
55 | (1) |
|
2.4 The Two "Mainstream" Public-Key Constructions |
|
|
56 | (5) |
|
2.5 Alternative Public-Key Constructions |
|
|
61 | (6) |
|
2.6 Is Computational Hardness the Rule or the Exception? |
|
|
67 | (12) |
|
|
69 | (10) |
|
3 Pseudorandom Functions: Three Decades Later |
|
|
79 | (80) |
|
|
|
|
80 | (7) |
|
|
87 | (5) |
|
3.3 Generic Constructions |
|
|
92 | (7) |
|
|
99 | (11) |
|
|
110 | (10) |
|
3.6 Complexity of Pseudorandom Functions |
|
|
120 | (6) |
|
|
126 | (13) |
|
3.8 Contemporary Constructions |
|
|
139 | (20) |
|
|
149 | (10) |
|
4 The Many Entropies in One-Way Functions |
|
|
159 | (60) |
|
|
|
|
160 | (7) |
|
|
167 | (6) |
|
4.3 Next-Block Entropy and Pseudorandom Generators |
|
|
173 | (15) |
|
4.4 Inaccessible Entropy and Statistically Hiding Commitment |
|
|
188 | (31) |
|
|
215 | (4) |
|
|
219 | (58) |
|
|
5.1 Computing on Encrypted Data |
|
|
219 | (7) |
|
5.2 Defining Homomorphic Encryption |
|
|
226 | (13) |
|
5.3 Realizing Leveled Homomorphic Encryption |
|
|
239 | (9) |
|
5.4 Realizing Fully Homomorphic Encryption |
|
|
248 | (11) |
|
|
259 | (8) |
|
|
267 | (10) |
|
|
268 | (9) |
|
6 How to Simulate It -- A Tutorial on the Simulation Proof Technique |
|
|
277 | (70) |
|
|
|
277 | (2) |
|
6.2 Preliminaries and Notation |
|
|
279 | (1) |
|
6.3 The Basic Paradigm - Semantic Security |
|
|
280 | (2) |
|
6.4 Secure Computation - Simulation for Semi-honest Adversaries |
|
|
282 | (9) |
|
6.5 Simulating the View of Malicious Adversaries -- Zero Knowledge |
|
|
291 | (19) |
|
6.6 Denning Security for Malicious Adversaries |
|
|
310 | (6) |
|
6.7 Determining Output -- Coin Tossing |
|
|
316 | (13) |
|
6.8 Extracting Inputs -- Oblivious Transfer |
|
|
329 | (9) |
|
6.9 The Common Reference String Model -- Oblivious Transfer |
|
|
338 | (2) |
|
|
340 | (7) |
|
|
343 | (4) |
|
7 The Complexity of Differential Privacy |
|
|
347 | (102) |
|
|
7.1 Introduction and Definition |
|
|
348 | (12) |
|
7.2 Composition Theorems for Differential Privacy |
|
|
360 | (7) |
|
7.3 Alternatives to Global Sensitivity |
|
|
367 | (6) |
|
7.4 Releasing Many Counting Queries with Correlated Noise |
|
|
373 | (8) |
|
7.5 Information-Theoretic Lower Bounds |
|
|
381 | (19) |
|
7.6 Computational Lower Bounds |
|
|
400 | (9) |
|
7.7 Efficient Algorithms for Specific Query Families |
|
|
409 | (8) |
|
|
417 | (8) |
|
7.9 Multiparty Differential Privacy |
|
|
425 | (6) |
|
7.10 Computational Differential Privacy |
|
|
431 | (4) |
|
|
435 | (14) |
|
|
438 | (11) |
Nomenclature |
|
449 | |