Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge ProofsCraig GentryJens Grothet al.2014Journal of Cryptology
Adaptive versus non-adaptive security of multi-party protocolsRan CanettiIvan Damgårdet al.2004Journal of Cryptology
Secure multiparty computation with general interaction patternsShai HaleviYuval Ishaiet al.2016ITCS 2016
Selective private function evaluation with applications to private statisticsR. CanettiY. Ishaiet al.2001PODC 2001
The round complexity of verifiable secret sharing and secure multicastR. GennaroY. Ishaiet al.2001STOC 2001