Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3149671

zbMath1010.94553MaRDI QIDQ3149671

Jesper Buus Nielsen, Ronald Cramer, Ivan B. Damgård

Publication date: 30 September 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (45)

Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingYOSO: You only speak once. Secure MPC with stateless ephemeral rolesBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationSecure multiparty computation with free branchingOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelHardware security without secure hardware: how to decrypt with a password and a serverPhysical zero-knowledge proof and NP-completeness proof of Suguru puzzleHow to deal with malicious users in privacy‐preserving distributed data miningEfficient and scalable universal circuitsTimed-release computational secret sharing and threshold encryptionEfficient RSA key generation and threshold Paillier in the two-party settingThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)Towards practical topology-hiding computationMultikey Fully Homomorphic Encryption and ApplicationsBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsUniversally composable \(\varSigma \)-protocols in the global random-oracle modelGroup homomorphic encryption: characterizations, impossibility results, and applicationsNetwork-agnostic security comes (almost) for free in DKG and MPCSecure multiparty computation from threshold encryption based on class groupsMPC with synchronous security and asynchronous responsivenessAsynchronous Multi-Party Computation with Quadratic CommunicationAdaptive security of multi-party protocols, revisitedOn communication-efficient asynchronous MPC with adaptive securityTight bounds for the multiplicative complexity of symmetric functionsResource fairness and composability of cryptographic protocolsQuadratic Error Minimization in a Distributed Environment with Privacy PreservingIdentification Schemes from Key Encapsulation MechanismsBenaloh’s Dense Probabilistic Encryption RevisitedIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksEfficient Binary Conversion for Paillier Encrypted ValuesUniversally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsBetter Preprocessing for Secure Multiparty ComputationMultiparty cardinality testing for threshold private intersectionBETA: biometric-enabled threshold authenticationMulti-party threshold private set intersection with sublinear communicationQuantum Homomorphic Encryption for Polynomial-Sized CircuitsOn Constructing Homomorphic Encryption Schemes from Coding TheoryActively secure setup for SPDZDistributed anonymous data perturbation method for privacy-preserving data miningUnnamed ItemAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerBit-Slice Auction CircuitThe price of active security in cryptographic protocols




This page was built for publication: