Back to Results
First PageMeta Content
XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer


One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be
Add to Reading List

Document Date: 2000-04-12 11:39:28


Open Document

File Size: 224,26 KB

Share Result on Facebook

Company

IBM Zurich Research Laboratory / /

/

Event

FDA Phase / Product Issues / Product Recall / /

Facility

NEC Research Institute / /

IndustryTerm

arbitrary algorithm / encrypted circuit computing g. / oblivious transfer protocols / secure computation protocols / probabilistic polynomial-time algorithm / probabilistic polynomial-time algorithms / sub-protocol / above solution / above protocol / secure function evaluation protocol / secure computation protocol / polynomial-time algorithms / oblivious transfer protocol / encrypted circuit computing g` / oneround secure computation protocol / ubiquitous tool / computing / transfer protocol / /

Organization

NEC Research Institute / /

Person

Unz / Bob / Ui / Ki / Alice / Knx / /

Position

extractor / simulator/extractor / player / model / honest-but-curious model / with perfect security against unbounded Bob / honest-but-curious model / /

Product

Definitions / OT-1 / H1 / OT-2 / Section / Bob / /

Technology

oblivious transfer protocol / above protocol / one-round oblivious transfer protocols / secure function evaluation protocol / polynomial-time algorithms / real protocol / transfer protocol / arbitrary algorithm / decoding algorithm / private key / secret key / one-round secure computation protocols / secure computation protocol / one-round protocol / one-round secure computation protocol / ANDOS protocol / resulting protocol / encryption / sampling algorithm / one-round oblivious transfer protocol / public key / OT-1 sub-protocol / 5.2 Protocol Our protocol / semantically secure encryption / oneround secure computation protocol / three probabilistic polynomial-time algorithms / probabilistic polynomial-time algorithm / simulation / /

SocialTag