Secure Two-Party Computation: A Visual Way (Q2948250): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Visual cryptography for general access structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-Sharing Schemes: A Survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Contrast Optimal Threshold Visual Cryptography Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035710 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and composition of multiparty cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Communication Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal colored threshold visual cryptography schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Colored visual cryptography without color darkening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2965402 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using Colors to Improve Visual Cryptography for Black and White Images / rank
 
Normal rank
Property / cites work
 
Property / cites work: Color visual cryptography schemes for black and white secret images / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Contrast-optimal k out of n secret sharing schemes in visual cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On secret sharing systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365722 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of security of Yao's protocol for two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Basing cryptographic protocols on tamper-evident seals / rank
 
Normal rank

Latest revision as of 20:57, 10 July 2024

scientific article
Language Label Description Also known as
English
Secure Two-Party Computation: A Visual Way
scientific article

    Statements

    Secure Two-Party Computation: A Visual Way (English)
    0 references
    0 references
    0 references
    30 September 2015
    0 references
    0 references
    Yao's construction
    0 references
    visual cryptography
    0 references
    secure computation
    0 references
    0 references