Author of the publication

Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE).

, , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 208-233. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rao, Vanishree
add a person with the name Rao, Vanishree
 

Other publications of authors with the same name

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks., , , , and . CODASPY, page 115-125. ACM, (2017)On the (In)security of Fischlin's Paradigm., , , and . TCC, volume 7785 of Lecture Notes in Computer Science, page 202-221. Springer, (2013)Revisiting Lower and Upper Bounds for Selective Decommitments., , , and . IACR Cryptology ePrint Archive, (2011)Standard Security Does Not Imply Indistinguishability Under Selective Opening., , and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 121-145. (2016)Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds., , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 586-613. Springer, (2015)Correlated-Input Secure Hash Functions., , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 182-200. Springer, (2011)Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation., , and . ASIACRYPT (1), volume 9452 of Lecture Notes in Computer Science, page 52-75. Springer, (2015)Statistical Concurrent Non-malleable Zero Knowledge., , , , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 167-191. Springer, (2014)Standard Security Does Not Imply Indistinguishability Under Selective Opening., , and . IACR Cryptology ePrint Archive, (2015)On the (In)security of Fischlin's Paradigm., , , and . IACR Cryptology ePrint Archive, (2012)