Two-round multiparty secure computation minimizing public key operations
From MaRDI portal
Recommendations
Cited in
(6)- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- Broadcast-optimal two-round MPC
- Multiparty reusable non-interactive secure computation from LWE
- Two-round multiparty secure computation from minimal assumptions
- Efficient secure two-party exponentiation
- Two-round Multiparty Secure Computation from Minimal Assumptions
This page was built for publication: Two-round multiparty secure computation minimizing public key operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q775971)