scientific article

From MaRDI portal
Revision as of 03:05, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4035733

zbMath0789.68044MaRDI QIDQ4035733

Donald Beaver

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (54)

Efficient set intersection with simulation-based securityAutomata evaluation and text search protocols with simulation-based securityFast cut-and-choose-based protocols for malicious and covert adversariesAnonymous Communication and Anonymous CashComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelCompact and Efficient UC Commitments Under Atomic-ExchangesSecure two-party computation via cut-and-choose oblivious transferCorrection to: ``Topology-hiding communication from minimal assumptionsSok: vector OLE-based zero-knowledge protocolsLower bounds and impossibility results for concurrent self compositionConcurrently composable non-interactive secure computationOblivious transfer with constant computational overheadPartial fairness in secure two-party computationFairness versus guaranteed output delivery in secure multiparty computationComposable Security in the Bounded-Quantum-Storage ModelImpossibility results for universal composability in public-key models and with fixed inputsCryptography and cryptographic protocolsFast large-scale honest-majority MPC for malicious adversariesMust the communication graph of MPC protocols be an expander?A full proof of the BGW protocol for perfectly secure multiparty computationOblivious polynomial evaluation and secure set-intersection from algebraic PRFsConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelScalable Multi-party Private Set-IntersectionConstant-round maliciously secure two-party computation in the RAM modelWhat security can we achieve within 4 rounds?Obfuscation for cryptographic purposesSecurity against covert adversaries: Efficient protocols for realistic adversariesOblivious Transfer Is SymmetricInformation-Theoretic Conditions for Two-Party Secure Function EvaluationAbstractions of non-interference security: probabilistic versus possibilisticEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesSimplified Universal Composability FrameworkEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesGNUC: a new universal composability frameworkEfficient Fully-Simulatable Oblivious TransferAdaptively Secure Two-Party Computation with ErasuresLocal Sequentiality Does Not Help for Concurrent CompositionComputationally secure pattern matching in the presence of malicious adversariesPrivate multiparty sampling and approximation of vector combinationsA proof of security of Yao's protocol for two-party computationAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsWhat Security Can We Achieve Within 4 Rounds?General composition and universal composability in secure multiparty computationOn black-box complexity of universally composable security in the CRS modelSecure multiplication of shared secrets in the exponentDistributed anonymous data perturbation method for privacy-preserving data miningStatistical Security Conditions for Two-Party Secure Function EvaluationMPC with friends and foesReverse firewalls for actively secure MPCsRobust threshold DSS signaturesConditional Reactive SimulatabilityAn efficient protocol for secure two-party computation in the presence of malicious adversaries




This page was built for publication: