Login / Signup
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Danny Harnik
Yuval Ishai
Eyal Kushilevitz
Published in:
CRYPTO (2007)
Keyphrases
</>
secure multiparty computation
privacy preserving
data sets
real world
databases
information systems
relational databases
privacy preserving data mining