Bounded-concurrent secure two-party computation without setup assumptions

From MaRDI portal
Publication:3581307


DOI10.1145/780542.780641zbMath1192.94123MaRDI QIDQ3581307

Yehuda Lindell

Publication date: 16 August 2010

Published in: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/780542.780641


68M12: Network protocols

94A62: Authentication, digital signatures and secret sharing


Related Items