搜索结果: 1-3 共查到“军事学 perfect security”相关记录3条 . 查询时间(0.071 秒)
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
quantum cryptography quantum encryption delegated quantum computation
2018/12/20
Quantum homomorphic encryption (QHE) is an important cryptographic technology for delegated quantum computation. It enables remote Server performing quantum computation on encrypted quantum data, and ...
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
Secure Computation / Multi-party Computation Constant-Rounds Linear Exponentiation Modulo Reduction Bit-Decomposition
2012/3/29
Bit-decomposition is an important primitive in multi-party computation (MPC). Given a sharing of secret $x$, it allows the parties to compute the sharings of the bits of $x$ in constant rounds. With t...
MPC vs. SFE: Perfect Security in a Unified Corruption Model
MPC SFE Unified Corruption Model
2008/9/11
Secure function evaluation (SFE) allows a set of players to compute an arbitrary agreed function of their private inputs, even if an adversary may corrupt some of the players. Secure multi-party compu...