Back to Results
First PageMeta Content
Key management / Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Certificate authority / Universal composability / Cryptography / Cryptographic protocols / Public-key cryptography


Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.
Add to Reading List

Document Date: 2009-07-16 07:03:28


Open Document

File Size: 233,19 KB

Share Result on Facebook

Company

Simple Bank Functionality / Fbank / Aladdin Knowledge Systems / Functionality Fbank / /

Country

Israel / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

Computer Science Bar-Ilan University / /

IndustryTerm

secure protocols / bank authority / probabilistic polynomial-time algorithms / non-uniform polynomial-time algorithm / trusted bank / public-key infrastructure / probabilistic polynomial-time protocol / real banking system / bank balances / digital signature law / privacy-preserving data mining / secure protocol / bank / important and useful tool / computing / legal infrastructure / /

Organization

Pi / Bar-Ilan University / P2 / P1 / UN Court / Pj / Pi Figure / Secure Two-Party Computation∗ Yehuda Lindell† Department / /

Position

model external authorities / /

Product

Legally Enforceable Fairness / P1 / /

Technology

secure two-party protocol / real protocol / public-key infrastructure / encryption / public key / probabilistic polynomial-time protocol / three probabilistic polynomial-time algorithms / data mining / non-uniform polynomial-time algorithm / digital signature / secure protocol / /

SocialTag