to compute the value f(x 1 ; :::; x n), where f is a predetermined function. Loosely speaking, an n-party protocol for this purpose has maximum privacy if whatever a subset of the users can eeciently compute when participating in the protocol, they can also compute from their local inputs and the value f(x 1 ; :::; x n). Recently, Goldreich, Micali and… (More)
Figures and Tables
Sorry, we couldn't extract any figures or tables for this paper.