Publication:4783725
From MaRDI portal
zbMath1002.94521MaRDI QIDQ4783725
Publication date: 8 December 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390171
94A60: Cryptography
Related Items
Cryptography and cryptographic protocols, More efficient shuffle argument from unique factorization, Private multiparty sampling and approximation of vector combinations, What security can we achieve within 4 rounds?, Transparent SNARKs from DARK compilers, Reverse firewalls for actively secure MPCs, Broadcast-optimal two round MPC with an honest majority, Tight state-restoration soundness in the algebraic group model, Generic plaintext equality and inequality proofs, Black-box accumulation based on lattices, Oblivious transfer from trapdoor permutations in minimal rounds, What Security Can We Achieve Within 4 Rounds?, Two-Message, Oblivious Evaluation of Cryptographic Functionalities, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage