Practical Secure Two-Party Computation : Techniques , Tools , and Applications


Many compelling applications involve computations that require sensitive data from two or more individuals. As an example, consider the myriad genetics applications soon to be within reach of individuals as the cost of personal genome sequencing rapidly plummets. An individual may wish to compare her genome with the genomes of different groups of… (More)

8 Figures and Tables


  • Presentations referencing similar topics