搜索结果: 1-3 共查到“军事学 Adaptively Secure Two-Party Computation”相关记录3条 . 查询时间(0.062 秒)
Adaptively Secure Two-party Computation From Indistinguishability Obfuscation
Indistinguishability Obfuscation cryptographic protocols
2016/1/6
We present the first two-round, two-party general function evaluation protocol that is secure against
honest-but-curious adaptive corruption of both parties. In addition, the protocol is incoercible ...
One-Sided Adaptively Secure Two-Party Computation
Adaptive Security Non-Committing Encryption
2014/3/10
Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where ``hackers'' a...
Adaptively Secure Two-Party Computation with Erasures
Adaptively Secure Two-Party Computation Erasures
2009/6/11
In the setting of multiparty computation a set of parties with private inputs wish to compute
some joint function of their inputs, whilst preserving certain security properties (like privacy and
cor...