Two-Output Secure Computation with Malicious Adversaries

Abhi Shelat, Chih-Hao Shen. Two-Output Secure Computation with Malicious Adversaries. In Kenneth G. Paterson, editor, Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. Volume 6632 of Lecture Notes in Computer Science, pages 386-405, Springer, 2011. [doi]

@inproceedings{ShelatS11,
  title = {Two-Output Secure Computation with Malicious Adversaries},
  author = {Abhi Shelat and Chih-Hao Shen},
  year = {2011},
  doi = {10.1007/978-3-642-20465-4_22},
  url = {http://dx.doi.org/10.1007/978-3-642-20465-4_22},
  researchr = {https://researchr.org/publication/ShelatS11},
  cites = {0},
  citedby = {0},
  pages = {386-405},
  booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings},
  editor = {Kenneth G. Paterson},
  volume = {6632},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-20464-7},
}