Fast cut-and-choose-based protocols for malicious and covert adversaries (Q290398): Difference between revisions
From MaRDI portal
Created a new Item |
Changed an Item |
||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6588393 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
two-party computation | |||
Property / zbMATH Keywords: two-party computation / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Yao's protocol | |||
Property / zbMATH Keywords: Yao's protocol / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
cut-and-choose | |||
Property / zbMATH Keywords: cut-and-choose / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
concrete efficiency | |||
Property / zbMATH Keywords: concrete efficiency / rank | |||
Normal rank |
Revision as of 20:38, 27 June 2023
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Fast cut-and-choose-based protocols for malicious and covert adversaries |
scientific article |
Statements
Fast cut-and-choose-based protocols for malicious and covert adversaries (English)
0 references
1 June 2016
0 references
two-party computation
0 references
Yao's protocol
0 references
cut-and-choose
0 references
concrete efficiency
0 references