Sign in

On the (In)Efficiency of Non-Interactive Secure Multiparty Computation.

Maki YoshidaSatoshi Obana
Published in: ICISC (2015)
Keyphrases
  • secure multiparty computation
  • privacy preserving
  • data sets
  • social networks
  • data analysis
  • user interaction