Login / Signup
Secure Two-Party Computation is Practical.
Benny Pinkas
Thomas Schneider
Nigel P. Smart
Stephen C. Williams
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
secure multi party computation
scalar product
privacy preserving
real world
key agreement protocol
data sets
neural network
highly efficient
data sharing