Author of the publication

One-Way Functions Imply Secure Computation in a Quantum World.

, , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 467-496. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On The Round Complexity of Two-Party Quantum Computation., , , and . IACR Cryptol. ePrint Arch., (2020)A New Framework for Quantum Oblivious Transfer., , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 363-394. Springer, (2023)SNARGs for P from Sub-exponential DDH and QR., , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 520-549. Springer, (2022)Round Optimal Concurrent Non-malleability from Polynomial Hardness.. TCC (2), volume 10678 of Lecture Notes in Computer Science, page 139-171. Springer, (2017)Statistical ZAP Arguments., , , , and . IACR Cryptology ePrint Archive, (2019)Publicly-Verifiable Deletion via Target-Collapsing Functions., , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 99-128. Springer, (2023)COA-Secure Obfuscation and Applications., , , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 731-758. Springer, (2022)SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE., , , and . IACR Cryptol. ePrint Arch., (2020)Weakening Assumptions for Publicly-Verifiable Deletion., , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 183-197. Springer, (2023)Weak Zero-Knowledge via the Goldreich-Levin Theorem., , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 142-173. Springer, (2023)