Taming adaptivity in YOSO protocols: the modular way
From MaRDI portal
Publication:6582166
Recommendations
Cites work
- scientific article; zbMATH DE number 1808209 (Why is no real title available?)
- scientific article; zbMATH DE number 1942416 (Why is no real title available?)
- Algorand: a secure and efficient distributed ledger
- An algebraic framework for Diffie-Hellman assumptions
- Anonymous public key encryption under corruptions
- Can a public blockchain keep a secret?
- New techniques for noninteractive zero-knowledge
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Random-index PIR and applications
- SCALES. MPC with small clients and larger ephemeral servers
- Two-party ECDSA from hash proof systems and efficient instantiations
- Universally Composable Security with Global Setup
- Universally composable synchronous computation
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles
This page was built for publication: Taming adaptivity in YOSO protocols: the modular way
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6582166)