Sign in

On the Power of Secure Two-Party Computation.

Carmit HazayMuthuramakrishnan Venkitasubramaniam
Published in: J. Cryptol. (2020)
Keyphrases
  • key agreement protocol
  • database
  • lightweight
  • power consumption
  • information retrieval
  • database systems
  • efficient computation
  • security analysis
  • standard model