<--- Back to Details
First PageDocument Content
Cryptography / Mathematics / Theoretical computer science / Computational complexity theory / Secret sharing / Quantum complexity theory / Secure multi-party computation / IP / PP / Polynomial / Communication complexity / Lagrange polynomial
Date: 2018-08-09 16:19:58
Cryptography
Mathematics
Theoretical computer science
Computational complexity theory
Secret sharing
Quantum complexity theory
Secure multi-party computation
IP
PP
Polynomial
Communication complexity
Lagrange polynomial

Best of Both Worlds in Secure Computation, with Low Communication Overhead

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 1,86 MB

Share Document on Facebook

Similar Documents

Logical Methods in Computer Science Vol. 10(1:, pp. 1–29 www.lmcs-online.org Submitted Published

Logical Methods in Computer Science Vol. 10(1:, pp. 1–29 www.lmcs-online.org Submitted Published

DocID: 1xTZi - View Document

Logical Methods in Computer Science Vol. 2 (5:, pp. 1–31 www.lmcs-online.org Submitted Published

Logical Methods in Computer Science Vol. 2 (5:, pp. 1–31 www.lmcs-online.org Submitted Published

DocID: 1xTH1 - View Document

PP_icon-1_Einladung_A4_L3.indd

PP_icon-1_Einladung_A4_L3.indd

DocID: 1xTEi - View Document

ADVANCE INFORMATION  100 POEMS ARE NOT ENOUGHNon-Fiction > Poetry Walking BookFairs-PAN ǀ Rs 299 ǀ 104 pp

ADVANCE INFORMATION 100 POEMS ARE NOT ENOUGHNon-Fiction > Poetry Walking BookFairs-PAN ǀ Rs 299 ǀ 104 pp

DocID: 1xTyC - View Document

Logical Methods in Computer Science Vol. 4 (4:, pp. 1–21 www.lmcs-online.org Submitted Published

Logical Methods in Computer Science Vol. 4 (4:, pp. 1–21 www.lmcs-online.org Submitted Published

DocID: 1xTht - View Document