Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks.
Xiaoyi YangMeijuan HuangPublished in: Int. J. Comput. Sci. Eng. (2018)
Keyphrases
- semi honest
- privacy preserving
- multi party
- computer networks
- cooperative
- structured peer to peer
- lightweight
- fault tolerant
- privacy preserving data mining
- peer to peer networks
- distributed systems
- distributed environment
- network structure
- wide area network
- dot product
- network nodes
- group communication
- peer to peer
- social networks
- rights management
- scalar product
- security level
- heterogeneous networks