费解 发表于 2025-3-23 12:13:55

http://reply.papertrans.cn/31/3031/303003/303003_11.png

笼子 发表于 2025-3-23 16:11:02

http://reply.papertrans.cn/31/3031/303003/303003_12.png

aggravate 发表于 2025-3-23 20:28:31

Search Problemsse that is being held by .. The (informal) security requirements for search problems assert that the server should not learn any useful information regarding the search conducted by the client, while the client should learn the search result but nothing more.

Crayon 发表于 2025-3-24 01:35:06

1619-7100 ing for researchers in the area of privacy-preserving data mIn the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are cor

Morsel 发表于 2025-3-24 04:37:04

https://doi.org/10.1007/978-3-642-94518-2 We begin with the classic definitions of security in the presence of semi-honest and malicious adversaries, and then proceed to the more recent notion of security in the presence of covert adversaries.

dandruff 发表于 2025-3-24 07:58:14

https://doi.org/10.1007/978-3-322-98513-2 for didactic reasons; it serves as a good warm-up for understanding how to prove security in this model. Nevertheless, we stress that more efficient oblivious transfer protocols are known (both for the covert and malicious settings; see Section 7.4 for an example).

婴儿 发表于 2025-3-24 12:58:30

http://reply.papertrans.cn/31/3031/303003/303003_17.png

痴呆 发表于 2025-3-24 18:22:20

978-3-642-26576-1Springer-Verlag Berlin Heidelberg 2010

Eeg332 发表于 2025-3-24 21:46:40

http://reply.papertrans.cn/31/3031/303003/303003_19.png

切割 发表于 2025-3-25 00:23:17

http://reply.papertrans.cn/31/3031/303003/303003_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Efficient Secure Two-Party Protocols; Techniques and Const Carmit Hazay,Yehuda Lindell Book 2010 Springer-Verlag Berlin Heidelberg 2010 Cov