Login / Signup

How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?

Danny HarnikYuval IshaiEyal Kushilevitz
Published in: CRYPTO (2007)
Keyphrases
  • secure multiparty computation
  • privacy preserving
  • data sets
  • real world
  • databases
  • information systems
  • relational databases
  • privacy preserving data mining