Author of the publication

Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.

, , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Efficient and Reusable Private Function Evaluation with Linear Complexity., , and . IACR Cryptology ePrint Archive, (2018)CertLedger: A new PKI model with Certificate Transparency based on blockchain., , and . Comput. Secur., (2019)A New Partial Key Exposure Attack on Multi-power RSA., , and . CAI, volume 9270 of Lecture Notes in Computer Science, page 103-114. Springer, (2015)A Secure and Efficient Protocol for Electronic Treasury Auctions., , and . BalkanCryptSec, volume 9024 of Lecture Notes in Computer Science, page 123-140. Springer, (2014)Estonian Voting Verification Mechanism Revisited., , , and . CoRR, (2016)More Efficient Secure Outsourcing Methods for Bilinear Maps., , , and . IACR Cryptology ePrint Archive, (2015)Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing.. IACR Cryptology ePrint Archive, (2016)Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates., , , and . IACR Cryptology ePrint Archive, (2017)CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain., , and . IACR Cryptology ePrint Archive, (2018)Efficient and verifiable algorithms for secure outsourcing of cryptographic computations., and . Int. J. Inf. Sec., 15 (5): 519-537 (2016)