Author of the publication

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.

, , , , , , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An information theoretical model for quantum secret sharing., , , , and . Quantum Information & Computation, 5 (1): 69-80 (2005)Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions., , , and . Comput. J., 58 (10): 2738-2746 (2015)Efficient fully simulatable oblivious transfer from the McEliece assumptions., and . ITW, page 638-642. IEEE, (2011)Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra., , , , , and . IEEE Trans. Information Forensics and Security, 11 (1): 59-73 (2016)Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data., , , , , and . IEICE Transactions, 94-A (2): 725-734 (2011)Oblivious Transfer Based on the McEliece Assumptions., , , and . IEICE Transactions, 95-A (2): 567-575 (2012)On the Composability of Statistically Secure Random Oblivious Transfer., , and . CoRR, (2018)A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM., , , , and . IACR Cryptology ePrint Archive, (2017)A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model., , and . IACR Cryptology ePrint Archive, (2008)On the Composability of Statistically Secure Bit Commitments., , , and . IACR Cryptology ePrint Archive, (2008)