<--- Back to Details
First PageDocument Content
Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols
Date: 2014-07-21 08:57:56
Secure multi-party computation
Secure two-party computation
IP
Oblivious transfer
PP
Communications protocol
Communication complexity
RSA
Security parameter
Cryptography
Theoretical computer science
Cryptographic protocols

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 522,92 KB