Publications

Note: the order of the papers here is according to the year of the conference in which the paper was presented.

How To Simulate It – A Tutorial on the Simulation Proof Technique

Attribute-based Key Exchange with General Policies

Optimizing Semi-Honest Secure Multiparty Computation for the Internet

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

More Efficient Constant-Round Multi-Party Computation from BMR and SHE.

Skip to content