Back to Results
First PageMeta Content
Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation


Document Date: 2011-04-04 06:52:20


Open Document

File Size: 144,24 KB

Share Result on Facebook

City

Lattice / /

Company

Cambridge University Press / /

Country

Denmark / /

Currency

pence / /

IndustryTerm

real-world applications / cryptographic protocols / i.e. protocols / airline / secure function evaluation protocols / possible solution / public key infrastructure / secure signal processing / secure cryptographic protocol / trusted public key infrastructure / online latency / data-mining / online phase / early protocols / cryptographic protocol / offline/online approach / /

Organization

Cambridge University / /

Position

circuit evaluator / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

encryption / cryptography / public key infrastructure / Semi-homomorphic encryption / additively homomorphic encryption / secure cryptographic protocol / public key / purpose MPC protocols / MPC protocol / MPC protocols / BeDOZa protocol / PKI / secure function evaluation protocols / cryptographic protocol / i.e. protocols / simulation / same protocol / early protocols / generic MPC protocol / /

URL

http /

SocialTag