Login / Signup
Secure Computation with Preprocessing via Function Secret Sharing.
Elette Boyle
Niv Gilboa
Yuval Ishai
Published in:
TCC (1) (2019)
Keyphrases
</>
secret sharing
preprocessing
secret sharing scheme
multi party
electronic voting
visual cryptography scheme
key management
image sequences
secret image
feature extraction
post processing
image processing
privacy preserving