Cryptology ePrint Archive: Report 2014/857

Available versions in chronological order


Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Secure Computation from Time-Lock Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi

Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi


[ Cryptology ePrint archive ]