Composition of Secure Multi-Party Protocols

Available
0
StarStarStarStarStar
0Reviews

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired mult...

Read more
E-book
pdf
Price
44.99 £

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired mult...

Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9783540398196
  • Publication Date: 2 Oct 2003
  • Publisher: Springer Berlin Heidelberg
  • Product language: English
  • Drm Setting: DRM