Author of the publication

Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.

, , , , , and . IACR Cryptol. ePrint Arch., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs., , , , and . IACR Cryptol. ePrint Arch., (2024)Can Alice and Bob Guarantee Output to Carol?, , and . IACR Cryptol. ePrint Arch., (2023)Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 307-335. (2016)On perfectly secure 2PC in the OT-hybrid model., and . Theor. Comput. Sci., (2021)MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably., , , and . IACR Cryptol. ePrint Arch., (2022)On Secure Computation of Solitary Output Functionalities With and Without Broadcast., and . IACR Cryptol. ePrint Arch., (2022)On Secure Computation of Solitary Output Functionalities with and Without Broadcast., and . TCC (2), volume 14370 of Lecture Notes in Computer Science, page 94-123. Springer, (2023)Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort., , , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 436-466. Springer, (2021)On Perfectly Secure 2PC in the OT-Hybrid Model., and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 561-595. Springer, (2019)Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort., , , , , and . IACR Cryptol. ePrint Arch., (2020)