Pages that link to "Item:Q3580972"
From MaRDI portal
The following pages link to Bounded-concurrent secure multi-party computation with a dishonest majority (Q3580972):
Displayed 17 items.
- Secure computation without authentication (Q656923) (← links)
- Private multiparty sampling and approximation of vector combinations (Q1014646) (← links)
- General composition and universal composability in secure multiparty computation (Q1027983) (← links)
- Lower bounds and impossibility results for concurrent self composition (Q2425531) (← links)
- Protocols for multiparty coin toss with a dishonest majority (Q2516525) (← links)
- Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security (Q2802147) (← links)
- Network-Hiding Communication and Applications to Multi-party Protocols (Q2829220) (← links)
- Concurrent Non-Malleable Commitments (and More) in 3 Rounds (Q2829950) (← links)
- Universally Composable Private Proximity Testing (Q3092361) (← links)
- Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious (Q3179362) (← links)
- Local Sequentiality Does Not Help for Concurrent Composition (Q3623059) (← links)
- Cryptography Using Captcha Puzzles (Q4916003) (← links)
- The Complexity of Zero Knowledge (Q5458822) (← links)
- How to obtain full privacy in auctions (Q5492128) (← links)
- Constant-Round Nonmalleable Commitments from Any One-Way Function (Q5501951) (← links)
- On the Exact Round Complexity of Self-composable Two-Party Computation (Q5738974) (← links)
- Magic Adversaries Versus Individual Reduction: Science Wins Either Way (Q5738980) (← links)