Date: 2011-02-19 14:29:40Cryptography Secure multi-party computation Secure two-party computation Ciphertext indistinguishability Consensus Secret sharing IP Control theory | | MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hirAdd to Reading ListSource URL: www.cs.rpi.eduDownload Document from Source Website File Size: 247,36 KBShare Document on Facebook
|