![Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory](https://www.pdfsearch.io/img/f4d530d061030b61571ca75a2da1aa41.jpg) Date: 2011-02-19 14:29:40Cryptography Secure multi-party computation Secure two-party computation Ciphertext indistinguishability Consensus Secret sharing IP Control theory | | MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hirAdd to Reading ListSource URL: www.cs.rpi.eduDownload Document from Source Website File Size: 247,36 KBShare Document on Facebook
|