Canetti, Ran; Chakraborty, Suvradip; Khurana, Dakshita; Kumar, Nishant; Poburinnaya, Oxana; Prabhakaran, Manoj COA-secure obfuscation and applications. (English) Zbl 1496.94031 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 731-758 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 13275, 731--758 (2022; Zbl 1496.94031) Full Text: DOI
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. (English) Zbl 1512.94068 SIAM J. Comput. 51, No. 2, STOC17-333-STOC17-399 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., SIAM J. Comput. 51, No. 2, STOC17--333-STOC17--399 (2022; Zbl 1512.94068) Full Text: DOI
Canetti, Ran; Park, Sunoo; Poburinnaya, Oxana Fully deniable interactive encryption. (English) Zbl 1504.94113 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 807-835 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 12170, 807--835 (2020; Zbl 1504.94113) Full Text: DOI
Canetti, Ran; Poburinnaya, Oxana Towards multiparty computation withstanding coercion of all parties. (English) Zbl 07496587 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12551, 410-438 (2020). MSC: 68P25 68Mxx 94A60 PDFBibTeX XMLCite \textit{R. Canetti} and \textit{O. Poburinnaya}, Lect. Notes Comput. Sci. 12551, 410--438 (2020; Zbl 07496587) Full Text: DOI
Canetti, Ran; Poburinnaya, Oxana; Raykova, Mariana Optimal-rate non-committing encryption. (English) Zbl 1417.94049 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 212-241 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 10626, 212--241 (2017; Zbl 1417.94049) Full Text: DOI
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. (English) Zbl 1369.68206 Hatami, Hamed (ed.) et al., Proceedings of the 49th annual ACM SIGACT symposium on theory of computing, STOC ’17, Montreal, QC, Canada, June 19–23, 2017. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4528-6). 497-509 (2017). MSC: 68Q05 68Q10 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., in: Proceedings of the 49th annual ACM SIGACT symposium on theory of computing, STOC '17, Montreal, QC, Canada, June 19--23, 2017. New York, NY: Association for Computing Machinery (ACM). 497--509 (2017; Zbl 1369.68206) Full Text: DOI
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan Better two-round adaptive multi-party computation. (English) Zbl 1400.94130 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 396-427 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 10175, 396--427 (2017; Zbl 1400.94130) Full Text: DOI
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana Adaptively secure two-party computation from indistinguishability obfuscation. (English) Zbl 1382.94077 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 557-585 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 9015, 557--585 (2015; Zbl 1382.94077) Full Text: DOI