Concurrent general composition of secure protocols in the timing model

    STOC, pp. 644-653, 2005.

    Cited by: 39|Bibtex|Views3|Links
    EI
    Keywords:
    mild timing assumptionjoint computationsecure multiparty protocolcertain time boundreasonable assumptionMore(10+)

    Abstract:

    In the setting of secure multiparty computation, a set of mutually distrustful parties wish to jointly compute some function of their input (i.e., they wish to securely carry out some distributed task). %The joint computation should be such that even In the stand-alone case, it has been shown that every efficient function can be securely ...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments