|
Volumn 3958 LNCS, Issue , 2006, Pages 458-473
|
Efficiency tradeoffs for malicious two-party computation
|
Author keywords
Malicious adversary; Secure function evaluation; Secure two party computation; Yao's garbled circuit
|
Indexed keywords
INFORMATION THEORY;
LOGIC DESIGN;
MATHEMATICAL MODELS;
NETWORK PROTOCOLS;
PUBLIC KEY CRYPTOGRAPHY;
MALICIOUS ADVERSARY;
SECURE FUNCTION EVALUATION;
SECURE TWO-PARTY COMPUTATION;
YAO'S GARBLED CIRCUIT;
COMPUTATION THEORY;
|
EID: 33745843587
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/11745853_30 Document Type: Conference Paper |
Times cited : (101)
|
References (18)
|