Sign in

Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.

Ran CanettiShafi GoldwasserOxana Poburinnaya
Published in: TCC (2) (2015)
Keyphrases
  • encryption scheme
  • key agreement protocol
  • lightweight
  • security issues
  • reverse engineering
  • efficient computation
  • cryptographic protocols
  • group communication
  • unauthorized access
  • database views