malicious server / generation algorithm / multiparty computation protocol / computation computing / web applications / important applications / obvious solution / round protocol / data mining / proof systems / cloud computing / honest-but-curious solution / encryption algorithm / /
Organization
Danish National Research Foundation / Aarhus University / Bar-Ilan University / National Science Foundation / Department of Computer Science / Sino-Danish Center for the Theory of Interactive Computation / Faculty of Engineering / P2 / /
Person
Sebastian Faust† Carmit Hazay / Ivan Damg / /
Position
author / extractor / CPA / probability CPA / player / /
Technology
encryption / appropriately chosen encryption / multiparty computation protocol / two-message protocol / RAM / two-party protocol / KeyGen algorithm / PPT algorithm / Refresh algorithms / key generation algorithm / public key / encryption algorithm / data mining / round protocol / two PPT algorithms / secret key / random access / simulation / digital signature / three PPT algorithms / 2.1 Public Key Encryption / one round protocol / 2-party UC-secure protocol / 2-message protocol / mobile devices / /