搜索结果: 1-2 共查到“军事学 efficient secure two-party computation”相关记录2条 . 查询时间(0.077 秒)
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
cryptographic protocols / Garbled circuits cut-and-choose error correcting codes
2013/4/18
One of the main tools to construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based protocols with securi...
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
cryptographic protocols
2013/4/18
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secure two-party computation based on the cut-and-choose paradigm. In existing instantiations of this par...