<--- Back to Details
First PageDocument Content
Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation
Date: 2011-04-04 06:52:20
Secure two-party computation
Information-theoretic security
Homomorphic encryption
Public-key cryptography
Quantum cryptography
Cryptographic primitive
Noisy-storage model
Universal composability
Cryptography
Cryptographic protocols
Secure multi-party computation

Add to Reading List

Source URL: u.cs.biu.ac.il

Download Document from Source Website

File Size: 144,24 KB

Share Document on Facebook

Similar Documents

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

DocID: 1xUAz - View Document

Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALY

DocID: 1vhtk - View Document

LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, Denmark

DocID: 1tquI - View Document

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

DocID: 1tjRM - View Document

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

DocID: 1tjPL - View Document