Sciweavers

31 search results - page 7 / 7
» Fully homomorphic encryption using ideal lattices
Sort
View
SIAMCOMP
2011
13 years 1 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...