×

Found 8 Documents (Results 1–8)

COA-secure obfuscation and applications. (English) Zbl 1496.94031

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 731-758 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully deniable interactive encryption. (English) Zbl 1504.94113

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 807-835 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards multiparty computation withstanding coercion of all parties. (English) Zbl 07496587

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12551, 410-438 (2020).
MSC:  68P25 68Mxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimal-rate non-committing encryption. (English) Zbl 1417.94049

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 212-241 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. (English) Zbl 1369.68206

Hatami, Hamed (ed.) et al., Proceedings of the 49th annual ACM SIGACT symposium on theory of computing, STOC ’17, Montreal, QC, Canada, June 19–23, 2017. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4528-6). 497-509 (2017).
MSC:  68Q05 68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Better two-round adaptive multi-party computation. (English) Zbl 1400.94130

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 396-427 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure two-party computation from indistinguishability obfuscation. (English) Zbl 1382.94077

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 557-585 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field