Télécharger le livre :  Efficient Secure Two-Party Protocols
Ajouter à ma liste d'envies
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...

Editeur : Springer
Parution : 2010-11-02
Collection : Information Security and Cryptography
PDF

168,79