Login / Signup
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
Published in:
TCC (1) (2017)
Keyphrases
</>
closed form
optimal solution
neural network
data structure
dynamic programming
optimal design
security requirements
data sets
upper bound
lightweight
efficient computation
security analysis
standard model
key distribution