×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [threshold decryption]
Modulo Reduction for Paillier Encryptions and Application to
596 views
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana
278 views
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of
235 views
Secure Multi-party Computation Minimizing Online Rounds
30 views
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
43 views
Handcuffing Big Brother: Abuse-Resilient Transaction Escrow
30 views