Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1030985 - MaRDI portal

scientific article; zbMATH DE number 1030985

From MaRDI portal
Publication:4343427

zbMath0876.94026MaRDI QIDQ4343427

Jeroen van de Graaf, Claude Crépeau, Alain Tapp

Publication date: 1 December 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (28)

One-way functions imply secure computation in a quantum worldOblivious transfer in incomplete networksOn insecurity of Naor-Pinkas' distributed oblivious transferOblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key AgreementRate-limited secure function evaluationOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemGeneralizing Efficient Multiparty ComputationEfficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)On sufficient oracles for secure computation with identifiable abortOn the impossibility of non-static quantum bit commitment between two partiesCryptography with certified deletionSecure computation with shared EPR pairs (or: how to teleport in zero-knowledge)On the question of secret probability distributions in quantum bit commitmentComposable Security in the Bounded-Quantum-Storage ModelMulti-party computation with conversion of secret sharingInformation-Theoretic Conditions for Two-Party Secure Function EvaluationOT-Combiners via Secure ComputationQuantum state secure transmission in network communicationsOn the Complexity of Additively Homomorphic UC CommitmentsOn the power of secure two-party computationAccelerating Oblivious Transfer with Batch Multi-exponentiationCompact, efficient and UC-secure isogeny-based oblivious transferOn Garbling Schemes with and Without PrivacyOn the Power of Secure Two-Party ComputationA Single Initialization Server for Multi-party CryptographyStatistical Security Conditions for Two-Party Secure Function EvaluationOblivious Transfer Based on the McEliece AssumptionsEfficient and tight oblivious transfer from PKE with tight multi-user security




This page was built for publication: