Author:
Beck Gabrielle,Goel Aarushi,Jain Abhishek,Kaptchuk Gabriel
Publisher
Springer International Publishing
Reference39 articles.
1. Fips pub 180–2, secure hash standard (shs), 2002. U.S. Department of Commerce/National Institute of Standards and Technology (2002)
2. Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 2087–2104. ACM Press, October 2017
3. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Denning, D.E., Pyle, R., Ganesan, R., Sandhu, R.S., Ashby, V. (eds.) ACM CCS 93, pp. 62–73. ACM Press, November 1993
4. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press, May 1988
5. Chase, M., et al.: Post-quantum zero-knowledge and signatures from symmetric-key primitives. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 1825–1842. ACM Press, October 2017
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Scalable Multiparty Computation from Non-linear Secret Sharing;Lecture Notes in Computer Science;2024
2. Scalable Multiparty Garbling;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. Experimenting with Zero-Knowledge Proofs of Training;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Privacy-preserving cryptographic algorithms and protocols: a survey on designs and applications;SCIENTIA SINICA Informationis;2023-09-01
5. FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10