Back to Results
First PageMeta Content
Software / Universal composability / Data / Secure multi-party computation / Advantage / Actor model / Ciphertext indistinguishability / Adversary model / Security parameter / Cryptographic protocols / Cryptography / Computing


On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†
Add to Reading List

Document Date: 2015-05-07 10:35:40


Open Document

File Size: 403,17 KB

Share Result on Facebook

Company

Reliable Information Systems / Microsoft / /

Country

India / /

Currency

pence / /

/

Event

Product Issues / FDA Phase / Product Recall / /

Facility

Boston University / /

IndustryTerm

concurrent secure protocols / secure protocols / constant round protocol / arbitrary protocols / insecure network / obfuscation using tamperproof hardware / obfuscation using tamper-proof hardware / n-round protocol / computation protocol / constant round protocols / computing / /

Organization

National Science Foundation / MIT / U.S. Government / P2 / Boston University / P1 / /

Person

Bob / Alice / David / /

/

Position

author / /

Product

Now / Can01 / /

Technology

concurrently secure protocols / cryptography / two-party protocol / constant round protocol / two-party computation protocol / simulation / real two-party protocol / concurrent secure protocols / n-round protocol / UC secure protocols / authenticated encryption / constant round protocols / /

SocialTag