Concurrent general composition of secure protocols in the timing model
STOC, pp. 644-653, 2005.
mild timing assumptionjoint computationsecure multiparty protocolcertain time boundreasonable assumptionMore(10+)
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to jointly compute some function of their input (i.e., they wish to securely carry out some distributed task). %The joint computation should be such that even In the stand-alone case, it has been shown that every efficient function can be securely ...More
Full Text (Upload PDF)