... A framework for efficient adaptively secure composable oblivious transfer in the ROM . Cryptology ePrint Archive , Report 2017/993 ( 2017 ) . https : //eprint.iacr . org / 2017 / 993 5. Baum , C. , et al .: Publicly verifiable zero ...
... A framework for efficient adaptively secure composable oblivious transfer in the ROM. CoRR, abs/1710.08256 (2017) [BJX19] Bradley, T., Jarecki, S., Xu, J.: Strong asymmetric PAKE based on trapdoor CKEM. In: Boldyreva, A., Micciancio, D ...
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.
I have accumulated more debts than I can ever hope to repay. As mere statements of thanks are certainly insu cient, consider the rest of this preface my version of Chapter 11.
This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions.
This book's coverage includes Understanding your legal obligations to protect data Constructing a realistic database security threat model and ensuring that you address critical threats Designing robust database cryptographic infrastructure ...