First Page | Document Content | |
---|---|---|
![]() Date: 2014-09-16 07:30:08Secure two-party computation Zero-knowledge proof Commitment scheme Oblivious transfer Computational indistinguishability Oded Goldreich Ciphertext indistinguishability Man-in-the-middle attack Cryptography Cryptographic protocols Secure multi-party computation | Add to Reading List |