×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [threshold decryption]
Modulo Reduction for Paillier Encryptions and Application to
596 views
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana
275 views
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
40 views
Handcuffing Big Brother: Abuse-Resilient Transaction Escrow
30 views
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of
227 views
Secure Multi-party Computation Minimizing Online Rounds
28 views