Joint encryption and message-efficient secure computation
- 1 September 1996
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 9 (4), 217-232
- https://doi.org/10.1007/bf00189261
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Threshold cryptosystemsPublished by Springer Nature ,2001
- A key distribution system equivalent to factoringJournal of Cryptology, 1988
- Society and Group Oriented Cryptography: a New ConceptLecture Notes in Computer Science, 1988
- Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the ResultLecture Notes in Computer Science, 1988
- How to Solve any Protocol Problem - An Efficiency Improvement (Extended Abstract)Lecture Notes in Computer Science, 1988
- Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)Lecture Notes in Computer Science, 1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New directions in cryptographyIEEE Transactions on Information Theory, 1976