Protocols for bounded-concurrent secure two-party computation in the plain model
From MaRDI portal
Publication:3594441
Recommendations
- Bounded-concurrent secure two-party computation without setup assumptions
- Bounded-concurrent secure multi-party computation with a dishonest majority
- Theory of Cryptography
- Black-box constructions of bounded-concurrent secure computation
- Lower bounds and impossibility results for concurrent self composition
Cited In (7)
- Secure composition of cryptographic protocols. (Abstract)
- Concurrently secure computation in constant rounds
- The Complexity of Zero Knowledge
- Bounded-concurrent secure multi-party computation with a dishonest majority
- Bounded-concurrent secure two-party computation without setup assumptions
- Lower bounds and impossibility results for concurrent self composition
- Concurrent composition in the bounded quantum storage model
This page was built for publication: Protocols for bounded-concurrent secure two-party computation in the plain model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3594441)