📣 Help Shape the Future of UKRI's Gateway to Research (GtR)

We're improving UKRI's Gateway to Research and are seeking your input! If you would be interested in being interviewed about the improvements we're making and to have your say about how we can make GtR more user-friendly, impactful, and effective for the Research and Innovation community, please email gateway@ukri.org.

More Efficient Constant-Round Multi-party Computation from BMR and SHE

First Author: Lindell Y
Attributed to:  Trust and Security in Numbers funded by EPSRC

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1007/978-3-662-53641-4_21

Publication URI: http://dx.doi.org/10.1007/978-3-662-53641-4_21

Type: Book Chapter

Book Title: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (2016)

Page Reference: 554-581

ISBN: 978-3-662-53640-7

ISSN: 2666-9862