Publisher
Springer Nature Switzerland
Reference27 articles.
1. Abascal, J., Sereshgi, M.H.F., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Is the classical GMW paradigm practical? The case of non-interactive actively secure 2pc. In: CCS 2020: 2020 ACM SIGSAC, pp. 1591–1605 (2020). https://doi.org/10.1145/3372297.3423366
2. Acharya, A., Hazay, C., Kolesnikov, V., Prabhakaran, M.: SCALES - MPC with small clients and larger ephemeral servers. In: TCC 2022, pp. 502–531 (2022). https://doi.org/10.1007/978-3-031-22365-5_18
3. Acharya, A., Hazay, C., Kolesnikov, V., Prabhakaran, M.: Malicious security for SCALES: outsourced computation with ephemeral servers. IACR Cryptol. ePrint Arch., p. 383 (2024). https://eprint.iacr.org/2024/383
4. Bartusek, J., Garg, S., Srinivasan, A., Zhang, Y.: Reusable two-round MPC from LPN. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC 2022. LNCS, vol. 13177, pp. 165–193. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-97121-2_7
5. Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503–513 (1990). https://doi.org/10.1145/100216.100287