![Ciphertext indistinguishability / Secure multi-party computation / Advantage / Security parameter / Commitment / One-way function / Secret sharing / Public-key cryptography / Zero-knowledge proof / Cryptography / Cryptographic protocols / Commitment scheme Ciphertext indistinguishability / Secure multi-party computation / Advantage / Security parameter / Commitment / One-way function / Secret sharing / Public-key cryptography / Zero-knowledge proof / Cryptography / Cryptographic protocols / Commitment scheme](https://www.pdfsearch.io/img/9416bbf2c175ae52d9d69dd822589705.jpg)
| Document Date: 2014-07-16 19:58:40 Open Document File Size: 271,25 KBShare Result on Facebook
Company Shamir’s Secret Sharing We / Commitment Schemes / Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories / / / Event FDA Phase / / Facility Building Block / Building Blocks Given CECom0 / / IndustryTerm secure protocols / composable protocols / semi-honest oblivious transfer protocols / oblivious transfer protocol / round protocol / transfer protocols / semi-honest oblivious transfer protocol / resultant protocol / black-box protocols / non-black-box protocols / / Person Prabhakaran / R. Without / / Position extractor / plain model / rewinding extractor / / Product MMY06 / LP12 / CLP10 / IKLP06 / PS04 / Hai08 / CLOS02 / KMO14 / Goy11 / GMW87 / / Technology encryption / oblivious transfer protocol / UC-secure protocols / resultant protocol / MPC protocol / non-black-box protocols / black-box protocols / MPC protocols / constant-round semi-honest OT protocols / Composable Protocols / round semi-honest OT protocol / constantround semi-honest OT protocol / underlying semi-honest OT protocols / round semi-honest OT protocols / round protocol / semi-honest oblivious transfer protocol / simulation / semi-honest oblivious transfer protocols / 1 Introduction Protocols / /
SocialTag |