<--- Back to Details
First PageDocument Content
Cryptography / Mathematical analysis / Quantum complexity theory / Computational complexity theory / Functions and mappings / Secure multi-party computation / Communication complexity / Secure two-party computation / Limit of a function / Cryptographic protocol / Pi / PP
Date: 2006-09-25 10:55:42
Cryptography
Mathematical analysis
Quantum complexity theory
Computational complexity theory
Functions and mappings
Secure multi-party computation
Communication complexity
Secure two-party computation
Limit of a function
Cryptographic protocol
Pi
PP

Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

Add to Reading List

Source URL: cs-www.cs.yale.edu

Download Document from Source Website

File Size: 411,92 KB

Share Document on Facebook

Similar Documents

Session A1: Multi-Party Computation 1  CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

Session A1: Multi-Party Computation 1 CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

DocID: 1xUHA - View Document

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

DocID: 1xUE2 - View Document

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

DocID: 1xTeQ - View Document

THE STRUCTURE OF SECURE MULTI-PARTY COMPUTATION BY MICHAEL J. ROSULEK B.S., Iowa State University, 2003

THE STRUCTURE OF SECURE MULTI-PARTY COMPUTATION BY MICHAEL J. ROSULEK B.S., Iowa State University, 2003

DocID: 1vp2V - View Document

The Price of Low Communication in Secure Multi-Party Computation Juan Garay1 , Yuval Ishai2 , Rafail Ostrovsky3 , and Vassilis Zikas4 1  2

The Price of Low Communication in Secure Multi-Party Computation Juan Garay1 , Yuval Ishai2 , Rafail Ostrovsky3 , and Vassilis Zikas4 1 2

DocID: 1tYUs - View Document