Cryptology ePrint Archive: Report 2014/857
Available versions in chronological order
20141022:182430 (posted 22-Oct-2014 18:24:30 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150228:221138 (posted 28-Feb-2015 22:11:38 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150228:221249 (posted 28-Feb-2015 22:12:49 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150228:221355 (posted 28-Feb-2015 22:13:55 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150901:164757 (posted 01-Sep-2015 16:47:57 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150901:164847 (posted 01-Sep-2015 16:48:47 UTC)
Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150901:165109 (posted 01-Sep-2015 16:51:09 UTC)
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
20150901:165230 (posted 01-Sep-2015 16:52:30 UTC)
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
[
Cryptology ePrint archive
]