Sciweavers

ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
13 years 11 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas