×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [threshold decryption]
Documents
Modulo Reduction for Paillier Encryptions and Application to
596 views
Documents
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana
278 views
Documents
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of
235 views
Documents
Secure Multi-party Computation Minimizing Online Rounds
30 views
Documents
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
43 views
Documents
Handcuffing Big Brother: Abuse-Resilient Transaction Escrow
30 views