Back to Results
First PageMeta Content
Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation


Efficient Secure Two-Party Protocols: Techniques and Constructions
Add to Reading List

Document Date: 2014-09-16 07:30:08


Open Document

File Size: 270,33 KB

Share Result on Facebook

City

Reading / /

Currency

pence / /

/

IndustryTerm

oblivious transfer protocols / secure protocols / oblivious transfer protocol / privacy-preserving data mining / circuit computing / higher-level protocols / secure search operations / /

Organization

European Research Council / /

Person

Tal Rabin / Boaz Barak / Rosario Gennaro / Alon Rosen / Tal Malkin / Kobbi Nissim / Shafi Goldwasser / Ivan Damg / Oded Goldreich / Moni Naor / Hugo Krawczyk / Eran Omri / Hila Zarosim / Yael Kalai / Benny Pinkas / Adam Smith / Jonathan Katz / Yehuda Lindell / /

Position

advisor / co-author / General / /

Technology

oblivious transfer protocol / cryptography / Two-Party Protocol / higher-level protocols / resulting protocols / Private-Key Encryption / Basic Protocol / GMW Protocol / data mining / 6 Sigma Protocols / simulation / oblivious transfer protocols / /

URL

http /

SocialTag