| Document Date: 2015-04-22 14:22:01 Open Document File Size: 455,44 KBShare Result on Facebook
Company Shamir / ACS / / Currency pence / / / Event FDA Phase / / Facility University of Maryland / / IndustryTerm constant round protocol / inner product / polynomial-time protocol / decryption algorithm / round protocol / transformation algorithm / Constant round protocols / threshold decryption algorithm / evaluation algorithms / secure computation protocol / basic protocol / above encryption algorithm / evaluation algorithm / threshold decryption protocol / secure protocol / decryption protocol / above protocols / party protocols / computing / particular protocol / encryption algorithm / demonstrating constant round protocols / / Organization University of Maryland / P1 / Pi addsP j∈S / / Person Beaver / Hao Liu† Elaine Shi / S. Dov Gordon / Charlie / Bob / Alice / / Position CRS model / using the same idea / / Product KO04 / DI05 / Garg / Asharov / CL14 / P1 / BMR90 / GGHR14 / Section / P2 / / ProgrammingLanguage C / L / / ProvinceOrState Maryland / / Technology threshold decryption protocol / resulting two round protocol / two-round fair protocols / one-round protocols / fair / polynomial-time protocol / Encryption Algorithm / PKI / two-round fair protocol / witness encryptions / transformation algorithm / 3-round protocol / basic three round protocol / three-round fair protocol / 2-round protocol / five-round protocol / The algorithm / private key / party protocols / secret key / fair protocol / evaluation algorithms / two-round protocol / one-round protocol / threshold decryption algorithm / three-round protocol / underlying fair protocol / encryption / three-round protocols / same set S. Our threshold decryption protocol / public key / decryption protocol / witness encryption / Eval algorithm / constant round protocol / Evaluation Algorithm / basic protocol / particular protocol / three round protocol / TFHE evaluation algorithm / underlying secure computation protocol / above encryption algorithm / 2-round / 3-party secure protocol / simulation / underlying protocol / decryption algorithm / above protocols / two-round secure protocol / above 3-round protocol / Constant round protocols / /
SocialTag |