Note: the order of the papers here is according to the year of the conference in which the paper was presented.

On the Composition of Secure Multi-Party Protocols

A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions

A Framework for Password-Based Authenticated Key Exchange

On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions

Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions

Lower Bounds for Non-Black-Box Zero-Knowledge

General Composition and Universal Composability in Secure Multi-Party Computation

Skip to content