搜索结果: 1-2 共查到“Malicious and Covert Adversaries”相关记录2条 . 查询时间(0.067 秒)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
cryptographic protocols
2013/4/18
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achiev...
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Efficient Protocols Set Intersection Pattern Matching Malicious and Covert Adversaries
2009/6/11
In this paper we construct efficient secure protocols for set intersection and pattern match-
ing. Our protocols for securely computing the set intersection functionality are based on secure
pseudor...