Back to Results
First PageMeta Content
Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Cryptography / Cryptographic protocols / Public-key cryptography


Legally Enforceable Fairness in Secure Two-Party Computation
Add to Reading List

Document Date: 2011-07-07 17:00:19


Open Document

File Size: 206,94 KB

Share Result on Facebook

Company

Fbank / Aladdin Knowledge Systems / Creative Commons / Functionality Fbank / Simple Bank Functionality / /

Currency

pence / USD / /

Event

FDA Phase / /

IndustryTerm

real banking system / secure protocols / digital signature law / privacy-preserving data mining / secure protocol / bank authority / bank / probabilistic polynomial-time algorithms / non-uniform polynomial-time algorithm / public-key infrastructure / important and useful tool / computing / legal infrastructure / probabilistic polynomial-time protocol / /

Organization

Pi / UN Court / P2 / Pj / Pi Figure / P0 / P1 / /

Position

model external authorities / /

Product

Legally Enforceable Fairness / P1 / /

Technology

encryption / secure two-party protocol / public key / real protocol / probabilistic polynomial-time protocol / three probabilistic polynomial-time algorithms / data mining / non-uniform polynomial-time algorithm / secure protocol / digital signature / public-key infrastructure / /

URL

http /

SocialTag