Author of the publication

Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer.

, , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 330-349. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-interactive Keyed-Verification Anonymous Credentials., and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 66-96. Springer, (2019)Black-Box Uselessness: Composing Separations in Cryptography., , and . ITCS, volume 185 of LIPIcs, page 47:1-47:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer., , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 330-349. Springer, (2021)Oblivious Transfer with Constant Computational Overhead., , , , , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 271-302. Springer, (2023)Constrained Pseudorandom Functions from Homomorphic Secret Sharing., , , and . EUROCRYPT (3), volume 14006 of Lecture Notes in Computer Science, page 194-224. Springer, (2023)A Note on Non-interactive Zero-Knowledge from CDH., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 731-764. Springer, (2023)A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model.. EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 473-503. Springer, (2019)Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation., , , , , , and . ACM Conference on Computer and Communications Security, page 291-308. ACM, (2019)Sharp: Short Relaxed Range Proofs., , , and . CCS, page 609-622. ACM, (2022)Anonymous Whistleblowing over Authenticated Channels., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 685-714. Springer, (2022)