29
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

      other
      , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references26

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          How to generate and exchange secrets

          Andrew Yao (1986)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Security and Composition of Multiparty Cryptographic Protocols

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Efficient Identity-Based Encryption Without Random Oracles

                Bookmark

                Author and book information

                Book Chapter
                2005
                : 342-362
                10.1007/978-3-540-30576-7_19
                b3a7f995-504c-434c-aa28-cbca33e2ff3d
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,193

                Cited by21