Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)
From MaRDI portal
Publication:2819552
Recommendations
- scientific article; zbMATH DE number 1256784
- scientific article; zbMATH DE number 2013820
- Universally composable two-party and multi-party secure computation
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Cited in
(5)- On succinct arguments and witness encryption from groups
- When is a semi-honest secure multiparty computation valuable?
- Broadcast-optimal two-round MPC
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Impossibility results for universal composability in public-key models and with fixed inputs
This page was built for publication: Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2819552)