Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
4
views
22
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,431
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Broadcast-Optimal Two Round MPC with an Honest Majority
other
Author(s):
Ivan Damgård
,
Bernardo Magri
,
Divya Ravi
,
Luisa Siniscalchi
,
Sophia Yakoubov
Publication date
(Online):
August 11 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Biology of Macroalgae
Most cited references
22
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
307
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to play ANY mental game
O Goldreich
,
S Micali
,
A. Wigderson
(1987)
0
comments
Cited
136
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the (Im)possibility of Obfuscating Programs
Boaz Barak
,
Oded Goldreich
,
Rusell Impagliazzo
…
(2001)
0
comments
Cited
102
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
August 11 2021
Pages
: 155-184
DOI:
10.1007/978-3-030-84245-1_6
SO-VID:
62eaaf0d-0362-4a80-91d2-cbad26520620
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election
pp. 33
Computational Hardness of Optimal Fair Computation: Beyond Minicrypt
pp. 64
YOSO: You Only Speak Once
pp. 94
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
pp. 124
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration
pp. 155
Broadcast-Optimal Two Round MPC with an Honest Majority
pp. 185
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
pp. 214
On the Round Complexity of Black-Box Secure MPC
pp. 244
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
pp. 275
Unconditional Communication-Efficient MPC via Hall’s Marriage Theorem
pp. 305
Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions
pp. 335
Efficient Information-Theoretic Multi-party Computation over Non-commutative Rings
pp. 365
Pushing the Limits of Valiant’s Universal Circuits: Simpler, Tighter and More Compact
pp. 395
Oblivious Key-Value Stores and Amplification for Private Set Intersection
pp. 426
MHz2k: MPC from HE over \(\mathbb {Z}_{2^k}\) with New Packing, Simpler Reshare, and Better ZKP
pp. 457
Sublinear GMW-Style Compiler for MPC with Preprocessing
pp. 486
Limits on the Adaptive Security of Yao’s Garbling
pp. 519
Subtractive Sets over Cyclotomic Rings
pp. 549
A Compressed \(\varSigma \)-Protocol Theory for Lattices
pp. 580
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
pp. 641
Deniable Fully Homomorphic Encryption from Learning with Errors
pp. 673
Counterexamples to New Circular Security Assumptions Underlying iO
pp. 701
How to Meet Ternary LWE Keys
pp. 732
Lattice Reduction with Approximate Enumeration Oracles
pp. 760
Towards Faster Polynomial-Time Lattice Reduction
pp. 791
Lower Bounds on Lattice Sieving and Information Set Decoding
Similar content
3,431
A Modified MPC-Based Optimal Strategy of Power Management for Fuel Cell Hybrid Vehicles
Authors:
Hao Chen
,
Jian. Chen
,
Huaxin Lu
…
Economic MPC for online least costly energy management of hybrid electric vehicles
Authors:
Gabriele Pozzato
,
Matthias Müller
,
Simone Formentin
…
MPC-based yaw and lateral stabilisation via active front steering and braking
Authors:
Jahan Asgari
,
Francesco Borrelli
,
H. Eric Tseng
…
See all similar