• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Secure two-party computation in sublinear (amortized) time.

S. Dov GordonJonathan KatzVladimir KolesnikovFernando KrellTal MalkinMariana RaykovaYevgeniy Vahlis
Published in: CCS (2012)
Keyphrases
  • worst case
  • search tree
  • covert channel
  • key agreement protocol
  • data encryption
  • lightweight
  • efficient computation
  • sensitive data
  • key distribution