… obfuscation. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015, Part II. LNCS, vol. 9015, pp. 557–585. Springer, Heidelberg (2015). Chapter Google Scholar Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: 34th…
US
Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions | Springer Nature Link
https://unpaywall.org/10.1007%2F978-3-030-03807-6_7
…ar maps from lattices. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9015, pp. 498–527. Springer, Heidelberg (2015). Chapter Google Scholar Gentry, C., Jutla, C.S., Kane, D.: Obfuscation using tensor products. Cryptology ePrint Archive, Report 2018/756 (2018). Gentry, …
US
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes | Springer Nature Link
https://doi.org/10.1007/978-3-662-49890-3_2
…ded encoding. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015, Part II. LNCS, vol. 9015, pp. 528–556. Springer, Heidelberg (2015) Chapter Google Scholar Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC \(^{\text{0}}\) . In: FOCS, pp. 166–175 (2004) Google Scholar Appleb…