Engineering Secure Two-Party Computation Protocols

@inproceedings{Schneider2012EngineeringST,
  title={Engineering Secure Two-Party Computation Protocols},
  author={Thomas Schneider},
  booktitle={Springer Berlin Heidelberg},
  year={2012}
}
ing from the underlying cryptographic details. Our corresponding language and tool, called Tool for Automating Secure Two-party Computations (TASTY), allow one to describe, automatically generate, execute, and benchmark such modular and efficient SFE protocols. As an application example we consider privacy-preserving face recognition. Comments and Errata. Your feedback on the book or any errors you may find are highly appreciated. Please e-mail your comments and errata to thomaschneider@ gmail… CONTINUE READING
Highly Cited
This paper has 28 citations. REVIEW CITATIONS
16 Citations
117 References
Similar Papers

Similar Papers

Loading similar papers…