搜索结果: 1-3 共查到“密码学 covert adversaries”相关记录3条 . 查询时间(0.066 秒)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
cryptographic protocols
2013/4/18
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achiev...
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Efficient Protocols Set Intersection Pattern Matching Malicious and Covert Adversaries
2009/6/11
In this paper we construct efficient secure protocols for set intersection and pattern match-
ing. Our protocols for securely computing the set intersection functionality are based on secure
pseudor...
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Security Covert Adversaries Efficient Protocols Realistic Adversaries
2008/9/12
In the setting of secure multiparty computation, a set of mutually distrustful parties wish
to securely compute some joint function of their private inputs. The computation should be
carried out in ...