First Page | Document Content | |
---|---|---|
![]() Date: 2011-04-04 06:52:20Secure two-party computation Information-theoretic security Homomorphic encryption Public-key cryptography Quantum cryptography Cryptographic primitive Noisy-storage model Universal composability Cryptography Cryptographic protocols Secure multi-party computation | Source URL: u.cs.biu.ac.ilDownload Document from Source WebsiteFile Size: 144,24 KBShare Document on Facebook |
![]() | Authenticated Garbling and Efficient Maliciously Secure Two-Party ComputationDocID: 1xUAz - View Document |
![]() | Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALYDocID: 1vhtk - View Document |
![]() | LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, DenmarkDocID: 1tquI - View Document |
![]() | An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡DocID: 1tjRM - View Document |
![]() | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡DocID: 1tjPL - View Document |