1. Deniable encryption;Canetti,1997
2. Adaptively secure two-party computation from indistinguishability obfuscation;Canetti,2015
3. Two-round adaptively secure MPC from indistinguishability obfuscation;Garg,2015
4. Adaptively secure, universally composable, multiparty computation in constant rounds;Dachman-Soled,2015
5. A secure and optimally efficient multi-authority election scheme;Cramer,1997