Black-box constructions for secure computation
From MaRDI portal
Publication:2931374
Recommendations
Cited in
(26)- Theory of Cryptography
- A black-box construction of non-malleable encryption from semantically secure encryption
- Black-box constructions of protocols for secure computation
- On black-box complexity of universally composable security in the CRS model
- Classically verifiable NIZK for QMA with preprocessing
- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
- Black-box constructions of bounded-concurrent secure computation
- On Black-Box Complexity of Universally Composable Security in the CRS Model
- Computing boundary cycle of a pseudo-triangle polygon from its visibility graph
- Towards a unified approach to black-box constructions of zero-knowledge proofs
- Toward fine-grained blackbox separations between semantic and circular-security notions
- Round optimal black-box ``commit-and-prove
- Best possible information-theoretic MPC
- On the black-box use of somewhat homomorphic encryption in noninteractive two-party protocols
- Minicrypt primitives with algebraic structure and applications
- Efficient non-interactive secure computation
- Must you know the code of \(f\) to securely compute \(f\)?
- scientific article; zbMATH DE number 1418320 (Why is no real title available?)
- Secure multiparty RAM computation in constant rounds
- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
- Advances in Cryptology - EUROCRYPT 2004
- Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round
- Constant-round adaptive zero-knowledge proofs for NP
- Weak oblivious transfer from strong one-way functions
- On the power of public-key encryption in secure computation
- Round-efficient black-box construction of composable multi-party computation
This page was built for publication: Black-box constructions for secure computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2931374)