Login / Signup
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.
Arpita Patra
Akshayaram Srinivasan
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
black box
black boxes
white box
secure multiparty computation
neural network
integration testing
test cases
training data
data integration