Back to Results
First PageMeta Content
Complexity classes / Probabilistic complexity theory / Analysis of algorithms / PP / Quantum complexity theory / Bounded-error probabilistic polynomial / Randomized algorithm / IP / NP / Theoretical computer science / Computational complexity theory / Applied mathematics


How to Generate and Exchange Secrets (extended abstract)
Add to Reading List

Document Date: 2009-04-08 11:29:01


Open Document

File Size: 775,49 KB

Share Result on Facebook

Company

IEEE 162 Authorized / crets SA / Authorized / /

Currency

USD / /

Facility

University Princeton / West Virginia University / Interchange A / /

IndustryTerm

cryptographic protocols / oblivious transfer protocol / probabilistic polynomialtime algorithm / probabilistic algorithm / communications taking place / probabilistic polynomial-time algorithm / interactive proof systems / probabilistic polynomial-time algorithms / minimum-knowledge transler protocol / polynomial-time probabilistic algorithm / recovery algorithm / polynomial time probabilistic algorithm / minimum knowledge transfer protocol / polynomial-time computing power / /

Organization

Andrew Chi-Chih Yao* Department of Computer Science PrĀ·inceton University Princeton / National Science Foundation / MIT / West Virginia University / /

Person

M. Rabin / Andrew Chi-Chih Yao / /

Position

WB / player / /

ProgrammingLanguage

VB / /

ProvinceOrState

New Jersey / Pennsylvania / Massachusetts / /

Region

West Virginia / /

Technology

encryption / oblivious transfer protocol / t-1 / polynomial-time probabilistic algorithm / minimum-knowledge transler protocol / guessing algorithm / minimum knowledge transfer protocol / probabilistic polynomial-time algorithms / probabilistic polynomialtime algorithm / probabilistic polynomial-time algorithm / recovery algorithm / polynomial time probabilistic algorithm / probabilistic algorithm / /

SocialTag