Back to Results
First PageMeta Content
Finite fields / Key management / Secret sharing / Linear code / Algebraic geometry / Secure multi-party computation / RSA / Secret sharing using the Chinese remainder theorem / Verifiable secret sharing / Cryptography / Cryptographic protocols / Coding theory


Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1
Add to Reading List

Document Date: 2010-02-04 10:24:27


Open Document

File Size: 237,70 KB

Share Result on Facebook

City

Rehovot / Cambridge / Amsterdam / /

Country

United States / Netherlands / China / Israel / /

/

Facility

Leiden University / Fudan University / Weizmann Institute of Science / Mathematical Institute / /

IndustryTerm

secure computation protocols / inner product / large networks / communication-efficient protocols / error correction algorithms / /

Organization

Mathematical Institute / Leiden University / Fudan University / Shanghai / MIT / School of Information Science and Engineering / Department of Computing and Information Technology / Weizmann Institute of Science / /

Person

Ronald Cramer / Rabin / Beaver / Reed Solomon / /

/

Position

broadcast/negligible error model of Rabin / preprocessing model / broadcast model of Rabin / /

ProgrammingLanguage

C / K / /

ProvinceOrState

Massachusetts / /

Technology

cryptography / error correction algorithms / known secure computation protocols / Information Technology / /

URL

http /

SocialTag