Composition Of Secure Multi-Party Protocols
Use attributes for filter ! | |
Google books | books.google.com |
---|---|
Originally published | September 8, 2003 |
Authors | Yehuda Lindell |
Date of Reg. | |
Date of Upd. | |
ID | 2158556 |
About Composition Of Secure Multi-Party Protocols
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. . . .