Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1256767 - MaRDI portal

scientific article; zbMATH DE number 1256767

From MaRDI portal
Publication:4228503

zbMath0917.94012MaRDI QIDQ4228503

Donald Beaver

Publication date: 1 March 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (35)

On the round complexity of black-box secure MPCTwo-round MPC: information-theoretic and black-boxInformation-theoretic broadcast with dishonest majority for long messagesSecure Multiparty RAM Computation in Constant RoundsEverlasting UC commitments from fully malicious PUFsRound-optimal black-box protocol compilersMore efficient oblivious transfer extensionsOn the feasibility of extending oblivious transferThe Simplest Protocol for Oblivious TransferActively secure arithmetic computation and VOLE with constant computational overheadFully-secure MPC with minimal trustAdaptively code-correlation robustness functions and its applications to private set intersectionOblivious transfer with constant computational overheadSoftSpokenOT: quieter OT extension from small-field silent VOLE in the Minicrypt modelBatching base oblivious transfersOblivious-transfer complexity of noisy coin-toss via secure zero communication reductions\texttt{MOTIF}: (almost) free branching in GMW. Via vector-scalar multiplicationAmortizing rate-1 OT and applications to PIR and PSIActively Secure 1-out-of-N OT Extension with Application to Private Set IntersectionEfficient, actively secure MPC with a dishonest majority: a surveyAll-but-many encryptionImproved Private Set Intersection Against Malicious AdversariesOT-Combiners via Secure ComputationOn the Complexity of Additively Homomorphic UC CommitmentsHigh-performance multi-party computation for binary circuits based on oblivious transferOn perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelA proof of security of Yao's protocol for two-party computationOn the power of secure two-party computationBlazing fast OT for three-round UC OT extensionOblivious transfer is in MiniQCryptNetwork Oblivious TransferOn the Power of Secure Two-Party ComputationOn Complete Primitives for FairnessFounding Cryptography on Tamper-Proof Hardware Tokens




This page was built for publication: