Back to Results
First PageMeta Content
Universal composability / Computing / Secure multi-party computation / Secure two-party computation / Communications protocol / Universal Turing machine / Cryptography / Turing machine / Cryptographic protocols / Data / Information


A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti∗ Asaf Cohen†
Add to Reading List

Document Date: 2014-07-16 10:39:30


Open Document

File Size: 1,37 MB

Share Result on Facebook

Currency

pence / /

/

Facility

Check Point Institute / Tel-Aviv University / Boston University / Bar-Ilan University / /

IndustryTerm

asynchronous point-to-point network / arbitrary other secure and insecure protocols / given protocol / secure computation protocols / decommitment protocol / arbitrary protocol / arbitrary secure and insecure protocols / /

Organization

Pi / Check Point Institute for Information Security / Tel-Aviv University / Bar-Ilan University / Boston University / National Science Foundation / Department of Computer Science / /

/

Position

Prime Minister / /

Technology

secure and insecure protocols / given protocol / arbitrary protocol / decommitment protocol / UC protocols / public-key encryption / arbitrary secure and insecure protocols / API / secure computation protocols / /

SocialTag