1. Deniable encryption;Canetti,1997
2. Adaptively secure multi-party computation;Canetti,1996
3. Adaptively secure two-party computation from indistinguishability obfuscation;Canetti,2015
4. Two-round adaptively secure MPC from indistinguishability obfuscation;Garg,2015
5. Adaptively secure, universally composable, multiparty computation in constant rounds;Dachman-Soled,2015