First Page | Document Content | |
---|---|---|
Date: 2014-09-16 07:30:08Secure two-party computation Zero-knowledge proof Commitment scheme Oblivious transfer Computational indistinguishability Oded Goldreich Ciphertext indistinguishability Man-in-the-middle attack Cryptography Cryptographic protocols Secure multi-party computation | Efficient Secure Two-Party Protocols: Techniques and ConstructionsAdd to Reading ListSource URL: www.eng.biu.ac.ilDownload Document from Source WebsiteFile Size: 270,33 KBShare Document on Facebook |