Perfect secure computation in two rounds
From MaRDI portal
Publication:5149757
Recommendations
Cites work
- scientific article; zbMATH DE number 2086626 (Why is no real title available?)
- A minimal model for secure computation (extended abstract)
- Computationally private randomizing polynomials and their applications
- Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Cryptography in $NC^0$
- Degree 2 is complete for the round-complexity of malicious MPC
- Foundations of Cryptography
- Garbled circuits as randomized encodings of functions: a primer
- Round-optimal secure multiparty computation with honest majority
- Secure computation on the web: computing without simultaneous interaction
- Secure multiparty computation with minimal interaction
- Security and composition of multiparty cryptographic protocols
- Two-round MPC: information-theoretic and black-box
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
Cited in
(15)- Efficient perfectly secure computation with optimal resilience
- Randomized functions with high round complexity
- Perfect secure computation in two rounds
- Towards characterizing securely computable two-party randomized functions
- Secure multiparty computation with minimal interaction
- The Exact Round Complexity of Secure Computation
- Quadratic multiparty randomized encodings beyond honest majority and their applications
- On perfectly secure 2PC in the OT-hybrid model
- Additive randomized encodings and their applications
- scientific article; zbMATH DE number 2086626 (Why is no real title available?)
- Perfectly Secure Message Transmission in Two Rounds
- Two-round multiparty secure computation minimizing public key operations
- scientific article; zbMATH DE number 4191075 (Why is no real title available?)
- Robust additive randomized encodings from IO and pseudo-non-linear codes
- scientific article; zbMATH DE number 1942420 (Why is no real title available?)
This page was built for publication: Perfect secure computation in two rounds
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5149757)