费解 发表于 2025-3-23 12:13:55
http://reply.papertrans.cn/31/3031/303003/303003_11.png笼子 发表于 2025-3-23 16:11:02
http://reply.papertrans.cn/31/3031/303003/303003_12.pngaggravate 发表于 2025-3-23 20:28:31
Search Problemsse that is being held by .. The (informal) security requirements for search problems assert that the server should not learn any useful information regarding the search conducted by the client, while the client should learn the search result but nothing more.Crayon 发表于 2025-3-24 01:35:06
1619-7100 ing for researchers in the area of privacy-preserving data mIn the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are corMorsel 发表于 2025-3-24 04:37:04
https://doi.org/10.1007/978-3-642-94518-2 We begin with the classic definitions of security in the presence of semi-honest and malicious adversaries, and then proceed to the more recent notion of security in the presence of covert adversaries.dandruff 发表于 2025-3-24 07:58:14
https://doi.org/10.1007/978-3-322-98513-2 for didactic reasons; it serves as a good warm-up for understanding how to prove security in this model. Nevertheless, we stress that more efficient oblivious transfer protocols are known (both for the covert and malicious settings; see Section 7.4 for an example).婴儿 发表于 2025-3-24 12:58:30
http://reply.papertrans.cn/31/3031/303003/303003_17.png痴呆 发表于 2025-3-24 18:22:20
978-3-642-26576-1Springer-Verlag Berlin Heidelberg 2010Eeg332 发表于 2025-3-24 21:46:40
http://reply.papertrans.cn/31/3031/303003/303003_19.png切割 发表于 2025-3-25 00:23:17
http://reply.papertrans.cn/31/3031/303003/303003_20.png