Author of the publication

Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.

, , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH., , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 376-405. Springer, (2023)A PKI-based Framework for Establishing Efficient MPC Channels., and . CCS, page 1961-1980. ACM, (2021)On Removing Rejection Conditions in Practical Lattice-Based Signatures., , and . PQCrypto, volume 12841 of Lecture Notes in Computer Science, page 380-398. Springer, (2021)Reusable Two-Round MPC from DDH., , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 320-348. Springer, (2020)Non-Observable Quantum Random Oracle Model., , and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 417-444. Springer, (2023)Endemic Oblivious Transfer., and . ACM Conference on Computer and Communications Security, page 309-326. ACM, (2019)Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)Two-Round Oblivious Transfer from CDH or LPN., , , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 768-797. Springer, (2020)On the Quantum Security of OCB., , , and . IACR Cryptol. ePrint Arch., (2022)A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement., , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 111-130. Springer, (2019)