Login / Signup
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell
Benny Pinkas
Published in:
J. Cryptol. (2015)
Keyphrases
</>
semi honest
secure multi party computation
privacy preserving
privacy preserving data mining
secure multi party
multi party
dot product
vertically partitioned data
scalar product
homomorphic encryption
key agreement protocol