Login / Signup

Secure two-party computation in sublinear (amortized) time.

S. Dov GordonJonathan KatzVladimir KolesnikovFernando KrellTal MalkinMariana RaykovaYevgeniy Vahlis
Published in: CCS (2012)
Keyphrases
  • worst case
  • search tree
  • covert channel
  • key agreement protocol
  • data encryption
  • lightweight
  • efficient computation
  • sensitive data
  • key distribution