Pages that link to "Item:Q5445517"
From MaRDI portal
The following pages link to OT-Combiners via Secure Computation (Q5445517):
Displaying 16 items.
- On \(d\)-multiplicative secret sharing (Q604627) (← links)
- Oblivious transfer in incomplete networks (Q1629424) (← links)
- Secure computation using leaky correlations (asymptotically optimal constructions) (Q1631316) (← links)
- High-performance multi-party computation for binary circuits based on oblivious transfer (Q2044760) (← links)
- Combiners for functional encryption, unconditionally (Q2055605) (← links)
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages (Q2056737) (← links)
- Amplifying the security of functional encryption, unconditionally (Q2096505) (← links)
- Algebraic geometric secret sharing schemes over large fields are asymptotically threshold (Q2171881) (← links)
- On the power of secure two-party computation (Q2303458) (← links)
- More efficient oblivious transfer extensions (Q2408589) (← links)
- On the Complexity of Additively Homomorphic UC Commitments (Q2796142) (← links)
- Network Oblivious Transfer (Q2829221) (← links)
- On the Power of Secure Two-Party Computation (Q2829222) (← links)
- Secret Sharing Schemes with Algebraic Properties and Applications (Q3188241) (← links)
- Secure Computation from Leaky Correlated Randomness (Q3457091) (← links)
- Error-Tolerant Combiners for Oblivious Primitives (Q3519523) (← links)