Concurrent Composition of Secure Protocols in the Timing Model

    J. Cryptology, pp. 431-492, 2005.

    Cited by: 22|Bibtex|Views5|Links
    EI
    Keywords:
    Secure ProtocolLocal ClockProtocol ExecutionHonest PartySecure Multiparty Computation

    Abstract:

    In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case it has been shown that every efficient function can be securely computed. However, in the setting of concurrent composition, broad impossibility results have been prov...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments