Pages that link to "Item:Q1648849"
From MaRDI portal
The following pages link to \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits (Q1648849):
Displaying 50 items.
- Two-round MPC: information-theoretic and black-box (Q1629402) (← links)
- Perfect secure computation in two rounds (Q1629404) (← links)
- Two-round adaptively secure multiparty computation from standard assumptions (Q1629408) (← links)
- Succinct garbling schemes from functional encryption through a local simulation paradigm (Q1631342) (← links)
- What security can we achieve within 4 rounds? (Q2010586) (← links)
- Post-quantum multi-party computation (Q2056694) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- Unbounded multi-party computation from learning with errors (Q2056765) (← links)
- Towards accountability in CRS generation (Q2056795) (← links)
- BETA: biometric-enabled threshold authentication (Q2061958) (← links)
- Reverse firewalls for actively secure MPCs (Q2096547) (← links)
- Efficient and tight oblivious transfer from PKE with tight multi-user security (Q2096634) (← links)
- Two-round oblivious transfer from CDH or LPN (Q2119032) (← links)
- Broadcast-optimal two-round MPC (Q2119034) (← links)
- Three-round secure multiparty computation from black-box two-round oblivious transfer (Q2128560) (← links)
- On the round complexity of black-box secure MPC (Q2128561) (← links)
- Round-optimal and communication-efficient multiparty computation (Q2169992) (← links)
- A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement (Q2175906) (← links)
- Optimal bounded-collusion secure functional encryption (Q2175911) (← links)
- From FE combiners to secure MPC and back (Q2175912) (← links)
- Offline witness encryption with semi-adaptive security (Q2229274) (← links)
- On the exact round complexity of best-of-both-worlds multi-party computation (Q2691581) (← links)
- Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation? (Q2691585) (← links)
- Efficient and round-optimal oblivious transfer and commitment with adaptive security (Q2691588) (← links)
- Two-round maliciously secure computation with super-polynomial simulation (Q2695653) (← links)
- On actively-secure elementary MPC reductions (Q2695655) (← links)
- On communication models and best-achievable security in two-round MPC (Q2697851) (← links)
- Oblivious transfer from trapdoor permutations in minimal rounds (Q2697874) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (Q5041157) (← links)
- Reusable Two-Round MPC from LPN (Q5087256) (← links)
- Perfect Secure Computation in Two Rounds (Q5149757) (← links)
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier? (Q5918098) (← links)
- On the exact round complexity of secure three-party computation (Q5918099) (← links)
- Round-optimal secure multi-party computation (Q5918346) (← links)
- Low cost constant round MPC combining BMR and oblivious transfer (Q5919016) (← links)
- Minicrypt primitives with algebraic structure and applications (Q5925579) (← links)
- Minimizing setup in broadcast-optimal two round MPC (Q6061355) (← links)
- Beyond honest majority: the round complexity of fair and robust multi-party computation (Q6109085) (← links)
- mrNISC from LWE with polynomial modulus (Q6116180) (← links)
- mrNISC from LWE with polynomial modulus (Q6134835) (← links)
- Concurrently composable non-interactive secure computation (Q6135409) (← links)
- Knowledge encryption and its applications to simulatable protocols with low round-complexity (Q6135438) (← links)
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols (Q6155260) (← links)
- Two-round adaptively secure MPC from isogenies, LPN, or CDH (Q6157520) (← links)
- Quadratic multiparty randomized encodings beyond honest majority and their applications (Q6166962) (← links)
- Broadcast-optimal four-round MPC in the plain model (Q6582165) (← links)
- Broadcast-optimal two round MPC with asynchronous peer-to-peer channels (Q6619925) (← links)
- R3PO: reach-restricted reactive program obfuscation and its applications (Q6635820) (← links)
- Two-round maliciously-secure oblivious transfer with optimal rate (Q6637571) (← links)