2 Sharing Schemes

@inproceedings{Coretti20112SS,
  title={2 Sharing Schemes},
  author={Sandro Coretti},
  year={2011}
}
3 Secure Multi-Party Computation 2 3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.1.1 Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.2 Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.2 Passively Secure Multi-Party Computation . . . . . . . . . . . . . . . . . . . . . . 3 3.3 Actively Secure Multi-Party Computation . . . . . . . . . . . . . . . . . . . . . . . 5 3… CONTINUE READING

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
0 Extracted Citations
5 Extracted References
Similar Papers

Similar Papers

Loading similar papers…