<--- Back to Details
First PageDocument Content
Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory
Date: 2011-02-19 14:29:40
Cryptography
Secure multi-party computation
Secure two-party computation
Ciphertext indistinguishability
Consensus
Secret sharing
IP
Control theory

MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

Add to Reading List

Source URL: www.cs.rpi.edu

Download Document from Source Website

File Size: 247,36 KB

Share Document on Facebook

Similar Documents