Sign in

STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.

Zhihua XiaQi GuWenhao ZhouLizhi XiongJian WengNaixue Xiong
Published in: IEEE Trans. Computers (2024)
Keyphrases
  • neural network
  • information systems
  • access control
  • search strategy
  • efficient computation
  • cryptographic protocols
  • data encryption