Back to Results
First PageMeta Content
Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation


Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.
Add to Reading List

Document Date: 2009-12-20 09:14:45


Open Document

File Size: 262,48 KB

Share Result on Facebook

Company

IBM / /

Country

Israel / /

Currency

pence / /

/

Event

FDA Phase / Bankruptcy / /

Facility

Computer Science Technion Israel Institute of Technology Haifa / /

IndustryTerm

secure protocols / stand-alone protocol / asynchronous stand-alone protocols / secure protocol / stand-alone synchronous protocol / arbitrary network / information-theoretic protocols / synchronous protocols / /

Organization

Computer Science Technion Israel Institute of Technology Haifa / Yehuda Lindell Department of Computer Science Bar-Ilan University Ramat Gan / Israel Science Foundation / Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department / U.S. Securities and Exchange Commission / /

Person

Tal Rabin / /

Product

MR91 / BGW88 / DM00 / RB89 / HU06 / /

Technology

information-theoretic protocols / cryptography / asynchronous stand-alone protocols / 3 The protocol / known protocols / stand-alone protocol / real protocol / stand-alone synchronous protocol / synchronous protocols / executed protocols / information-theoretically secure protocols / statistically secure protocol / simulation / secure protocol / perfectly secure protocols / statistically secure protocols / /

SocialTag