First Page | Document Content | |
---|---|---|
Date: 2010-05-04 07:57:36Commitment scheme Zero-knowledge proof Oblivious transfer Secure two-party computation Proof of knowledge Communication complexity IP Polynomial Homomorphic encryption Cryptography Cryptographic protocols Secure multi-party computation | Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 301,43 KBShare Document on Facebook |