Sign in

On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.

Bar AlonOlga NissenbaumEran OmriAnat Paskin-CherniavskyArpita Patra
Published in: TCC (2) (2022)
Keyphrases
  • efficient computation
  • highly efficient
  • authentication protocol
  • key agreement protocol
  • real time
  • website
  • lightweight
  • security analysis
  • scalar product