Back to Results
First PageMeta Content
RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce


Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†
Add to Reading List

Document Date: 2015-04-22 14:22:01


Open Document

File Size: 455,44 KB

Share Result on Facebook

Company

Shamir / ACS / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

University of Maryland / /

IndustryTerm

constant round protocol / inner product / polynomial-time protocol / decryption algorithm / round protocol / transformation algorithm / Constant round protocols / threshold decryption algorithm / evaluation algorithms / secure computation protocol / basic protocol / above encryption algorithm / evaluation algorithm / threshold decryption protocol / secure protocol / decryption protocol / above protocols / party protocols / computing / particular protocol / encryption algorithm / demonstrating constant round protocols / /

Organization

University of Maryland / P1 / Pi addsP j∈S / /

Person

Beaver / Hao Liu† Elaine Shi / S. Dov Gordon / Charlie / Bob / Alice / /

Position

CRS model / using the same idea / /

Product

KO04 / DI05 / Garg / Asharov / CL14 / P1 / BMR90 / GGHR14 / Section / P2 / /

ProgrammingLanguage

C / L / /

ProvinceOrState

Maryland / /

Technology

threshold decryption protocol / resulting two round protocol / two-round fair protocols / one-round protocols / fair / polynomial-time protocol / Encryption Algorithm / PKI / two-round fair protocol / witness encryptions / transformation algorithm / 3-round protocol / basic three round protocol / three-round fair protocol / 2-round protocol / five-round protocol / The algorithm / private key / party protocols / secret key / fair protocol / evaluation algorithms / two-round protocol / one-round protocol / threshold decryption algorithm / three-round protocol / underlying fair protocol / encryption / three-round protocols / same set S. Our threshold decryption protocol / public key / decryption protocol / witness encryption / Eval algorithm / constant round protocol / Evaluation Algorithm / basic protocol / particular protocol / three round protocol / TFHE evaluation algorithm / underlying secure computation protocol / above encryption algorithm / 2-round / 3-party secure protocol / simulation / underlying protocol / decryption algorithm / above protocols / two-round secure protocol / above 3-round protocol / Constant round protocols / /

SocialTag