Login / Signup
Efficiently Enforcing Input Validity in Secure Two-party Computation.
Jonathan Katz
Alex J. Malozemoff
Xiao Wang
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
security model
real time
highly efficient
key agreement protocol
databases
social networks
key management
identity management
vertically partitioned data