Login / Signup
Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions.
Esther Hänggi
Severin Winkler
Published in:
CoRR (2024)
Keyphrases
</>
private information retrieval
efficient computation
knowledge transfer
peer to peer
quantum inspired
fair exchange protocols
database
data sets
learning algorithm