Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428124

DOI10.1007/b11817zbMath1122.94366OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428124

Jesper Buus Nielsen, Ivan B. Damgård

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (31)

Multi-party revocation in sovrin: performance through distributed trustEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting\( \mathsf{Rabbit} \): efficient comparison for secure multi-party computationA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationReconciling non-malleability with homomorphic encryptionA formal treatment of the role of verified compilers in secure computation\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networksEfficient RSA key generation and threshold Paillier in the two-party settingCumulatively all-lossy-but-one trapdoor functions from standard assumptions\textsf{Through the looking-glass}: benchmarking secure multi-party computation comparisons for \textsf{ReLU}'sSecure multiparty computation from threshold encryption based on class groupsMore constructions of lossy and correlation-secure trapdoor functionsRound-efficient Byzantine agreement and multi-party computation with asynchronous fallbackAdaptive security of multi-party protocols, revisitedOn communication-efficient asynchronous MPC with adaptive securityResource fairness and composability of cryptographic protocolsMulti-party computation with conversion of secret sharingBenaloh’s Dense Probabilistic Encryption RevisitedEfficient one-sided adaptively secure computationSimplified Threshold RSA with Adaptive and Proactive SecurityOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesUniversally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsPrivate Database Access with HE-over-ORAM ArchitectureConstant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared ValuesAdaptive oblivious transfer with access control from lattice assumptionsAdaptively secure MPC with sublinear communication complexityBetter Preprocessing for Secure Multiparty ComputationEncryption Switching ProtocolsAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackEfficient two-party exponentiation from quotient transferHierarchical and dynamic threshold Paillier cryptosystem without trusted dealer




This page was built for publication: Advances in Cryptology - CRYPTO 2003