Efficient Secure Two-Party Protocols

Available
0
StarStarStarStarStar
0Reviews
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This...
Read more
product_type_E-book
pdf
Price
149.50 £
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This...
Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9783642143038
  • Publication Date: 2 Nov 2010
  • Publisher: Springer Berlin Heidelberg
  • Product language: English
  • Drm Setting: DRM