Login / Signup
Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions.
Fabrice Benhamouda
Huijia Lin
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
Published in:
TCC (1) (2018)
Keyphrases
</>
secure multiparty computation
database systems
data sets
databases
information retrieval systems
privacy preserving