scientific article; zbMATH DE number 1304080

From MaRDI portal
Publication:4250770

zbMath0931.94019MaRDI QIDQ4250770

Stefan Dziembowski, Ronald Cramer, Tal Rabin, Martin Hirt, Ivan B. Damgård

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (36)

Adaptively secure distributed PRFs from LWEBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesEfficient Secure Multiparty Computation with Identifiable AbortPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Broadcast (and Round) Efficient Verifiable Secret SharingSecure Protocols with Asymmetric TrustPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundRevisiting the efficiency of asynchronous MPC with optimal resilience against general adversariesBuilding blocks of sharding blockchain systems: concepts, approaches, and open problems\textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generationPerfect MPC over layered graphsRound-efficient Byzantine agreement and multi-party computation with asynchronous fallbackOn the communication efficiency of statistically secure asynchronous MPC with optimal resilienceAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsMust the communication graph of MPC protocols be an expander?Adaptively Secure Non-interactive Threshold CryptosystemsAsynchronous Byzantine agreement with optimal resilienceSecure multi-party computation made simpleEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceComputations with a deck of cardsEfficient asynchronous verifiable secret sharing and multiparty computationMPC vs. SFE : Unconditional and Computational SecurityEfficient Simultaneous BroadcastOn the exact round complexity of secure three-party computationRound-preserving parallel composition of probabilistic-termination cryptographic protocolsOn Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous NetworksOn expected constant-round protocols for Byzantine agreementAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure MPC with sublinear communication complexitySecure Protocol TransformationsA Single Initialization Server for Multi-party CryptographyRound Efficient Unconditionally Secure Multiparty Computation ProtocolGuaranteed output delivery comes free in honest majority MPCAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackDynamic threshold secret reconstruction and its application to the threshold cryptographyResource-restricted cryptography: revisiting MPC bounds in the proof-of-work era




This page was built for publication: