Sciweavers

CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai