MPC with friends and foes
From MaRDI portal
Publication:2096545
Recommendations
Cites work
- scientific article; zbMATH DE number 176562 (Why is no real title available?)
- scientific article; zbMATH DE number 1942420 (Why is no real title available?)
- scientific article; zbMATH DE number 1504552 (Why is no real title available?)
- scientific article; zbMATH DE number 1418289 (Why is no real title available?)
- Adaptively secure multi-party computation with dishonest majority
- Best possible information-theoretic MPC
- Collusion-Free Multiparty Computation in the Mediated Model
- Collusion-Free Protocols in the Mediated Model
- Collusion-preserving computation
- Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
- Complete Fairness in Multi-party Computation without an Honest Majority
- Complete fairness in secure two-party computation
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Designing fully secure protocols for secure two-party computation of constant-domain functions
- Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
- Foundations of Cryptography
- How to share a secret
- MPC vs. SFE : Unconditional and Computational Security
- MPC vs. SFE: Perfect Security in a Unified Corruption Model
- MPC with friends and foes
- Minimal-latency secure function evaluation
- Nonmalleable Cryptography
- On achieving the ``best of both worlds in secure multiparty computation
- On the classification of finite Boolean functions up to fairness
- Realistic Failures in Secure Multi-party Computation
- Secure computation on the web: computing without simultaneous interaction
- Secure multiparty computation with minimal interaction
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
- Security and composition of multiparty cryptographic protocols
- The round complexity of verifiable secret sharing and secure multicast
- Theory of Cryptography
- Theory of Cryptography
- Two-round adaptively secure multiparty computation from standard assumptions
- Universally composable security with local adversaries
Cited in
(6)
This page was built for publication: MPC with friends and foes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096545)