Login / Signup
Secure two-party computation in sublinear (amortized) time.
S. Dov Gordon
Jonathan Katz
Vladimir Kolesnikov
Fernando Krell
Tal Malkin
Mariana Raykova
Yevgeniy Vahlis
Published in:
CCS (2012)
Keyphrases
</>
worst case
search tree
covert channel
key agreement protocol
data encryption
lightweight
efficient computation
sensitive data
key distribution