Login / Signup
Towards Billion-Gate Secure Computation with Malicious Adversaries.
Benjamin Kreuter
Abhi Shelat
Chih-Hao Shen
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
data sets
lightweight
semi honest
efficient computation
security issues
security model
cryptographic protocols
authentication scheme
insider attacks