Sciweavers

Share
TCC   2012 Theory of Cryptography Conference
Wall of Fame | Most Viewed TCC-2012 Paper
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
8 years 12 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source245
2Download preprint from source240
3Download preprint from source227
4Download preprint from source226
5Download preprint from source226
6Download preprint from source218
books