Back to Results
First PageMeta Content
Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms


On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on
Add to Reading List

Document Date: 2007-01-08 13:33:41


Open Document

File Size: 246,29 KB

Share Result on Facebook

Currency

pence / GBP / cent / /

/

Facility

By building / University of Maryland / /

IndustryTerm

secure protocols / logarithmicround protocols / n-party protocol / t-secure protocol / round protocols / studied protocols / constant-round protocols / polynomial-time algorithm / above protocol / polynomial-round protocol / /

Organization

Pi / University of Maryland / National Science Foundation / Pj / US-Israel Binational Science Foundation / /

Person

Pn / /

Position

player / honest player / /

ProvinceOrState

Maryland / /

Technology

t-secure protocol / super-logarithmic round protocols / above protocol / MPC protocol / n-party protocol / MPC protocols / logarithmicround protocols / PKI / polynomial-time algorithm / constant-round protocols / polynomial-round protocol / simulation / 1 Introduction Protocols / also studied protocols / be realized using a PKI / /

SocialTag