Back to Results
First PageMeta Content
Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST


A New Approach to Practical Active-Secure Two-Party Computation 1 1
Add to Reading List

Document Date: 2012-02-14 09:50:59


Open Document

File Size: 754,82 KB

Share Result on Facebook

City

Yao / /

Company

AES / /

Currency

ZAR / /

Event

FDA Phase / /

Facility

Ilan University Indian Institute of Technology Guwahati We / /

IndustryTerm

prior practical protocols / extension protocol / 2PC protocol / classic textbook protocol / purpose protocols / erent hardware / passive-secure protocol / 2PC protocols / cross products / /

Organization

Bar-Ilan University Indian Institute of Technology Guwahati We / U.S. Securities and Exchange Commission / /

Person

Bob / Alice / Peter Sebastian Nordholt / Claudio Orlandi / /

/

Position

The dealer / dealer / /

Product

FDeal / CKKZ11 / HIKN08 / F2PC / Gol04 / IPS08 / Fig / IKNP03 / /

ProgrammingLanguage

R / /

Technology

encryption / OT-based protocol / cryptography / purpose protocols / 4 This protocol / classic textbook protocol / 2PC protocols / passive-secure protocol / Two-Party Computation Protocol / OT protocol / 2PC protocol / generic MPC protocols / simulation / 2003 Ishai protocol / passive-secure OT extension protocol / /

SocialTag