Login / Signup
Post-quantum secure two-party computing protocols against malicious adversaries.
Yachao Huo
Zongqu Zhao
Panke Qin
Shujing Wang
Chengfu Zheng
Published in:
Concurr. Comput. Pract. Exp. (2024)
Keyphrases
</>
semi honest
privacy preserving
privacy preserving data mining
multi party
vertically partitioned data
sensitive information
dot product
key agreement protocol
homomorphic encryption
cryptographic protocols
quantum inspired
quantum computation
secure multiparty computation