Efficient Secure Two-Party Protocols: Techniques And Constructions
Use attributes for filter ! | |
Google books | books.google.com |
---|---|
Originally published | 2010 |
Authors | Yehuda Lindell |
Carmit Hazay | |
Date of Reg. | |
Date of Upd. | |
ID | 2015802 |
About Efficient Secure Two-Party Protocols: Techniques And Constructions
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. . . .