Author of the publication

Characterization of Secure Multiparty Computation Without Broadcast.

, , , and . J. Cryptol., 31 (2): 587-609 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Security of Lazy Users in Out-of-Band Authentication., , and . ACM Trans. Priv. Secur., 23 (2): 9:1-9:32 (2020)Characterization of Secure Multiparty Computation Without Broadcast., , , and . CoRR, (2021)Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols., and . IACR Cryptol. ePrint Arch., (2021)Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?, and . TCC (1), volume 11239 of Lecture Notes in Computer Science, page 421-447. Springer, (2018)Generic-Group Delay Functions Require Hidden-Order Groups., , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 155-180. Springer, (2020)Non-malleable Vector Commitments via Local Equivocability., and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 415-446. Springer, (2021)Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.. TCC (3), volume 13044 of Lecture Notes in Computer Science, page 382-414. Springer, (2021)The Security of Lazy Users in Out-of-Band Authentication., , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 575-599. Springer, (2018)Traitor Tracing for Threshold Decryption., , and . IACR Cryptol. ePrint Arch., (2023)Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varSigma $-Protocols., and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 222-250. Springer, (2021)