Back to Results
First PageMeta Content
Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information


Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†
Add to Reading List

Document Date: 2015-07-03 05:13:02


Open Document

File Size: 523,53 KB

Share Result on Facebook

City

Implies Game / /

Company

Theoretic Limited / /

Country

Israel / /

Currency

pence / /

/

Facility

Bar-Ilan University / Check Point Institute / Tel-Aviv University / /

IndustryTerm

model protocols / trusted correlation device / classic protocols / secure protocols / cryptographic protocols / realworld protocol / given protocol / mutli-party protocol / party protocols / real-world protocol / /

Organization

Check Point Institute for Information Security / Bar-Ilan University / Department of Computer Science / Faculty of Engineering / Tel-Aviv University / European Research Council / /

Person

Pi / Beaver / Ai / Marie Curie / /

Position

mediator / player / protocol designer / /

Product

Game Theoretic / /

Technology

Cryptography / two-party protocol / two-party protocols / mutli-party protocol / classic protocols / two party protocols / given protocol / simulation / realworld protocol / cryptographic secure protocols / model protocols / /

SocialTag