Sciweavers

STOC
2005
ACM
112views Algorithms» more  STOC 2005»
14 years 5 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford