Secure multi-party computation minimizing online rounds
From MaRDI portal
Publication:3650697
DOI10.1007/978-3-642-10366-7_16zbMATH Open1267.94054OpenAlexW1647887180MaRDI QIDQ3650697FDOQ3650697
Authors: Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_16
Recommendations
public key cryptographycryptographic protocolsmulti-party computationcomputing with encrypted datauniversal composition
Cited In (8)
- Two-Party Computing with Encrypted Data
- When it's all just too much: outsourcing MPC-preprocessing
- Two-round MPC: information-theoretic and black-box
- Secure computation with minimal interaction, revisited
- Reusable secure computation in the plain model
- Title not available (Why is that?)
- Commodity-based 2PC for arithmetic circuits
- Minimal-latency secure function evaluation
This page was built for publication: Secure multi-party computation minimizing online rounds
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3650697)