1. Two-round secure MPC from indistinguishability obfuscation;Garg,2014
2. Two round multiparty computation via multi-key FHE;Mukherjee,2016
3. Garbled protocols and two-round MPC from bilinear maps;Garg,2017
4. Two-round multiparty secure computation from minimal assumptions;Garg,2018
5. k-round multiparty computation from k-round oblivious transfer via garbled interactive circuits;Benhamouda,2018