Login / Signup
Adaptively Secure Two-party Computation From Indistinguishability Obfuscation.
Ran Canetti
Shafi Goldwasser
Oxana Poburinnaya
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
encryption scheme
neural network
relational databases
reverse engineering
key agreement protocol
databases
object oriented
key management
standard model
security model