Secure Two-Party Computation

profileabc654321

  

While it has known for 30 years that one can implement any two-party computation securely by using Yao’s garbled circuits, only recently have the corresponding protocols become practical. In particular, to achieve security against a malicious adversary, one often uses cut-and-choose together with other techniques. This is a rapidly changing area, which is also important for applications.

  • 4 years ago
  • 150
Answer(1)

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    Securetwopartycomoutation.edited1.docx12345.docx
  • attachment
    2281.pdf
  • attachment
    66.pdf