搜索结果: 1-3 共查到“军事学 Erasures”相关记录3条 . 查询时间(0.066 秒)
Removing Erasures with Explainable Hash Proof Systems
Oblivious Transfer Password Authenticated Key Exchange Erasures
2016/1/25
An important problem in secure multi-party computation is the design of protocols that can
tolerate adversaries that are capable of corrupting parties dynamically and learning their internal states. ...
Adaptively Secure Computation with Partial Erasures
Secure Two-Party Computation Adaptive Security Erasure
2015/12/30
Adaptive security is a strong corruption model that captures “hacking” attacks where an external
attacker breaks into parties’ machines in the midst of a protocol execution. There are two types of
a...
Adaptively Secure Two-Party Computation with Erasures
Adaptively Secure Two-Party Computation Erasures
2009/6/11
In the setting of multiparty computation a set of parties with private inputs wish to compute
some joint function of their inputs, whilst preserving certain security properties (like privacy and
cor...