Login / Signup

Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions.

Esther HänggiSeverin Winkler
Published in: CoRR (2024)
Keyphrases
  • private information retrieval
  • efficient computation
  • knowledge transfer
  • peer to peer
  • quantum inspired
  • fair exchange protocols
  • database
  • data sets
  • learning algorithm