Pages that link to "Item:Q2874549"
From MaRDI portal
The following pages link to Non-Interactive Secure Multiparty Computation (Q2874549):
Displayed 24 items.
- On cryptographic anonymity and unpredictability in secret sharing (Q783702) (← links)
- Best possible information-theoretic MPC (Q1631330) (← links)
- On the (in)efficiency of non-interactive secure multiparty computation (Q1650437) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- Threshold garbled circuits and ad hoc secure computation (Q2056781) (← links)
- Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions (Q2128566) (← links)
- Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials (Q2152064) (← links)
- Distributed (correlation) samplers: how to remove a trusted dealer in one round (Q2170033) (← links)
- On fully secure MPC with solitary output (Q2175916) (← links)
- Is information-theoretic topology-hiding computation possible? (Q2175925) (← links)
- Survey of information security (Q2385398) (← links)
- Blockchains enable non-interactive MPC (Q2697855) (← links)
- Multi-input Functional Encryption and Its Application in Outsourcing Computation (Q2801771) (← links)
- Multi-input Functional Encryption with Unbounded-Message Security (Q2953788) (← links)
- Brief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPC (Q5002786) (← links)
- On the Bottleneck Complexity of MPC with Correlated Randomness (Q5087257) (← links)
- Ad Hoc PSM Protocols: Secure Computation Without Coordination (Q5270377) (← links)
- Topology-Hiding Computation Beyond Logarithmic Diameter (Q5270378) (← links)
- Topology-hiding computation on all graphs (Q5919491) (← links)
- Multi-key and multi-input predicate encryption from learning with errors (Q6063533) (← links)
- Private simultaneous messages based on quadratic residues (Q6070349) (← links)
- How to obfuscate MPC inputs (Q6114268) (← links)
- Towards practical topology-hiding computation (Q6135413) (← links)
- Additive randomized encodings and their applications (Q6186592) (← links)