@dblp

Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries.

, , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 223-248. Springer, (2022)

Links and resources

Tags