Login / Signup
The All-or-Nothing Nature of Two-Party Secure Computation.
Amos Beimel
Tal Malkin
Silvio Micali
Published in:
CRYPTO (1999)
Keyphrases
</>
lightweight
key agreement protocol
real time
information retrieval
efficient computation
security issues
security protocols
data sets
artificial intelligence
search engine
website
authentication protocol
security model
user authentication