Adaptive versus non-adaptive security of multi-party protocols
From MaRDI portal
Publication:1882568
DOI10.1007/s00145-004-0135-xzbMath1091.94020MaRDI QIDQ1882568
Stefan Dziembowski, Tal Malkin, Yuval Ishai, Ran Canetti, Ivan B. Damgård
Publication date: 1 October 2004
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-004-0135-x
Related Items
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model, A full proof of the BGW protocol for perfectly secure multiparty computation, Efficient one-sided adaptively secure computation, On the Power of Secure Two-Party Computation, Adaptively Secure Two-Party Computation with Erasures