{"_id":"dtddG6mpcmoDKP3Kg","bibbaseid":"dutta-ganesh-patranabis-singh-computebutverifyefficientmultipartycomputationoverauthenticatedinputs-2024","author_short":["Dutta, M.","Ganesh, C.","Patranabis, S.","Singh, N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Moumita"],"propositions":[],"lastnames":["Dutta"],"suffixes":[]},{"firstnames":["Chaya"],"propositions":[],"lastnames":["Ganesh"],"suffixes":[]},{"firstnames":["Sikhar"],"propositions":[],"lastnames":["Patranabis"],"suffixes":[]},{"firstnames":["Nitin"],"propositions":[],"lastnames":["Singh"],"suffixes":[]}],"editor":[{"firstnames":["Kai-Min"],"propositions":[],"lastnames":["Chung"],"suffixes":[]},{"firstnames":["Yu"],"propositions":[],"lastnames":["Sasaki"],"suffixes":[]}],"title":"Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs","booktitle":"Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI","series":"Lecture Notes in Computer Science","volume":"15489","pages":"133–166","publisher":"Springer","year":"2024","url":"https://doi.org/10.1007/978-981-96-0938-3\\_5","doi":"10.1007/978-981-96-0938-3_5","timestamp":"Mon, 03 Mar 2025 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/asiacrypt/DuttaGPS24.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/asiacrypt/DuttaGPS24,\n author = {Moumita Dutta and\n Chaya Ganesh and\n Sikhar Patranabis and\n Nitin Singh},\n editor = {Kai{-}Min Chung and\n Yu Sasaki},\n title = {Compute, but Verify: Efficient Multiparty Computation over Authenticated\n Inputs},\n booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference\n on the Theory and Application of Cryptology and Information Security,\n Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}},\n series = {Lecture Notes in Computer Science},\n volume = {15489},\n pages = {133--166},\n publisher = {Springer},\n year = {2024},\n url = {https://doi.org/10.1007/978-981-96-0938-3\\_5},\n doi = {10.1007/978-981-96-0938-3\\_5},\n timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/asiacrypt/DuttaGPS24.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Dutta, M.","Ganesh, C.","Patranabis, S.","Singh, N."],"editor_short":["Chung, K.","Sasaki, Y."],"key":"DBLP:conf/asiacrypt/DuttaGPS24","id":"DBLP:conf/asiacrypt/DuttaGPS24","bibbaseid":"dutta-ganesh-patranabis-singh-computebutverifyefficientmultipartycomputationoverauthenticatedinputs-2024","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-981-96-0938-3\\_5"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/115/4391.bib","dataSources":["hCEuHfXG6cjnW7H6H","9N9iMqvH8DnBBisvh"],"keywords":[],"search_terms":["compute","verify","efficient","multiparty","computation","over","authenticated","inputs","dutta","ganesh","patranabis","singh"],"title":"Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs","year":2024}