Efficient set operations in the presence of malicious adversaries (Q434343): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Removed claim: author (P16): Item:Q271587 |
||
Property / author | |||
Property / author: Kobbi Nissim / rank | |||
Revision as of 08:59, 12 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Efficient set operations in the presence of malicious adversaries |
scientific article |
Statements
Efficient set operations in the presence of malicious adversaries (English)
0 references
10 July 2012
0 references
secure two-party protocols
0 references
set intersection
0 references
set union
0 references
malicious parties
0 references
constant-round protocols
0 references
oblivious pseudorandom function evaluation protocol
0 references