scientific article; zbMATH DE number 2009950
From MaRDI portal
Publication:4434870
Recommendations
Cited in
(22)- On complete primitives for fairness
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
- Fair Threshold Decryption with Semi-Trusted Third Parties
- scientific article; zbMATH DE number 1759773 (Why is no real title available?)
- Synchronizable fair exchange
- Secure two-party computation with fairness -- a necessary design principle
- Covert two-party computation
- Breaking and fixing garbled circuits when a gate has duplicate input wires
- Concurrent signatures from a variety of keys
- Partial fairness in secure two-party computation
- Cryptography and Game Theory: Designing Protocols for Exchanging Information
- An Efficient Protocol for Fair Secure Two-Party Computation
- Legally-Enforceable Fairness in Secure Two-Party Computation
- Complete characterization of fairness in secure two-party computation of Boolean functions
- Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
- \(1/p\)-secure multiparty computation without an honest majority and the best of both worlds
- Legally Fair Contract Signing Without Keystones
- Resource fairness and composability of cryptographic protocols
- scientific article; zbMATH DE number 2084607 (Why is no real title available?)
- Efficiently making secure two-party computation fair
- How to obtain full privacy in auctions
- Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434870)