Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities
From MaRDI portal
Publication:4910282
Recommendations
- Towards characterizing securely computable two-party randomized functions
- scientific article; zbMATH DE number 1497864
- scientific article; zbMATH DE number 2086506
- Designing fully secure protocols for secure two-party computation of constant-domain functions
- Two-message, oblivious evaluation of cryptographic functionalities
- Engineering secure two-party computation protocols. Design, optimization, and applications of efficient secure function evaluation
- Verifiable functional encryption
- Practical design of two-party cryptographic protocols
- Functional Re-encryption and Collusion-Resistant Obfuscation
Cited in
(2)
This page was built for publication: Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4910282)