Date: 2009-07-16 07:03:28Key management Secure multi-party computation Secure two-party computation Cheque Digital signature Standard model Random oracle Certificate authority Universal composability Cryptography Cryptographic protocols Public-key cryptography | | Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel. Add to Reading ListSource URL: cjtcs.cs.uchicago.eduDownload Document from Source Website File Size: 233,19 KBShare Document on Facebook
|