Practical Secure Two-Party Computation : Techniques , Tools , and Applications

Abstract

Many compelling applications involve computations that require sensitive data from two or more individuals. As an example, consider the myriad genetics applications soon to be within reach of individuals as the cost of personal genome sequencing rapidly plummets. An individual may wish to compare her genome with the genomes of different groups of… (More)

8 Figures and Tables

Topics

  • Presentations referencing similar topics