General secure multi-party computation from any linear secret-sharing scheme

From MaRDI portal
Publication:3374918







Cited in
(99)






This page was built for publication: General secure multi-party computation from any linear secret-sharing scheme

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374918)