A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is
Despite such positive results, even though nowadays we know black-box constructions for secure two-party and multi-party computation even in constant rounds, there still are in Cryptography several constructions ... that critically require non-black-box use of primitives in order to securely realize some fundamental tasks. ... Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, volume 7417 of Lecture Notes in Computer Science. Springer, 2012. ...doi:10.1145/2591796.2591879 dblp:conf/stoc/GoyalOSV14 fatcat:2cn4htdd4req3lfcc5jumdhphy