Login / Signup
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.
Ran Canetti
Shafi Goldwasser
Oxana Poburinnaya
Published in:
TCC (2) (2015)
Keyphrases
</>
encryption scheme
key agreement protocol
lightweight
security issues
reverse engineering
efficient computation
cryptographic protocols
group communication
unauthorized access
database views