Exploring the boundaries of topology-hiding computation
From MaRDI portal
Publication:1653090
DOI10.1007/978-3-319-78372-7_10zbMath1415.94405OpenAlexW2794449410MaRDI QIDQ1653090
Marshall Ball, Tal Moran, Tal Malkin, Elette Boyle
Publication date: 17 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78372-7_10
Related Items (7)
Topology-hiding computation beyond semi-honest adversaries ⋮ Is information-theoretic topology-hiding computation possible? ⋮ Correction to: ``Topology-hiding communication from minimal assumptions ⋮ Towards practical topology-hiding computation ⋮ Must the communication graph of MPC protocols be an expander? ⋮ Topology-hiding computation on all graphs ⋮ Topology-hiding computation for networks with unknown delays
This page was built for publication: Exploring the boundaries of topology-hiding computation