Sign in
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
power consumption
lightweight
identity management
database
database systems
power system
secret sharing