{"_id":"7j8JPGMeeJeNZdmAz","bibbaseid":"ananth-choudhuri-goel-jain-tworoundinformationtheoreticmpcwithmalicioussecurity-2018","downloads":0,"creationDate":"2019-02-17T16:04:50.411Z","title":"Two Round Information-Theoretic MPC with Malicious Security","author_short":["Ananth, P.","Choudhuri, A. R.","Goel, A.","Jain, A."],"year":2018,"bibtype":"article","biburl":"https://dblp.org/pid/160/8650.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Prabhanjan"],"propositions":[],"lastnames":["Ananth"],"suffixes":[]},{"firstnames":["Arka","Rai"],"propositions":[],"lastnames":["Choudhuri"],"suffixes":[]},{"firstnames":["Aarushi"],"propositions":[],"lastnames":["Goel"],"suffixes":[]},{"firstnames":["Abhishek"],"propositions":[],"lastnames":["Jain"],"suffixes":[]}],"title":"Two Round Information-Theoretic MPC with Malicious Security","journal":"IACR Cryptology ePrint Archive","volume":"2018","pages":"1078","year":"2018","url":"https://eprint.iacr.org/2018/1078","timestamp":"Tue, 11 Dec 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/bib/journals/iacr/AnanthCGJ18a","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/AnanthCGJ18a,\n author = {Prabhanjan Ananth and\n Arka Rai Choudhuri and\n Aarushi Goel and\n Abhishek Jain},\n title = {Two Round Information-Theoretic {MPC} with Malicious Security},\n journal = {{IACR} Cryptology ePrint Archive},\n volume = {2018},\n pages = {1078},\n year = {2018},\n url = {https://eprint.iacr.org/2018/1078},\n timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/bib/journals/iacr/AnanthCGJ18a},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Ananth, P.","Choudhuri, A. R.","Goel, A.","Jain, A."],"key":"DBLP:journals/iacr/AnanthCGJ18a","id":"DBLP:journals/iacr/AnanthCGJ18a","bibbaseid":"ananth-choudhuri-goel-jain-tworoundinformationtheoreticmpcwithmalicioussecurity-2018","role":"author","urls":{"Paper":"https://eprint.iacr.org/2018/1078"},"downloads":0},"search_terms":["two","round","information","theoretic","mpc","malicious","security","ananth","choudhuri","goel","jain"],"keywords":[],"authorIDs":[],"dataSources":["7rx8eHRW3jkKsvTBa"]}