![Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms](https://www.pdfsearch.io/img/2cfc8027dc5f35fd41fdb9b890fa54c4.jpg) Date: 2007-01-08 13:33:41Secure multi-party computation IP Adversary model Transmission Control Protocol Cryptography Mathematics Computing Cryptographic protocols Applied mathematics Analysis of algorithms | | On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending onAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 246,29 KBShare Document on Facebook
|