CLASH 发表于 2025-3-25 04:58:17

Der Kampf um den verlorenen TagIn this chapter, we show how to securely compute any deterministic, singleoutput non-reactive functionality in the presence of malicious adversaries. As we have shown in Section 2.5, this suffices for obtaining secure computation of any two-party probabilistic reactive functionality, with almost the same complexity.

Allergic 发表于 2025-3-25 08:14:44

Malicious AdversariesIn this chapter, we show how to securely compute any deterministic, singleoutput non-reactive functionality in the presence of malicious adversaries. As we have shown in Section 2.5, this suffices for obtaining secure computation of any two-party probabilistic reactive functionality, with almost the same complexity.

借喻 发表于 2025-3-25 12:24:47

Introductionre multiparty computation. This places the topic of this book in its larger context. Following this, we describe the basic results and techniques related to efficiency in secure computation. Finally, we conclude with a roadmap to the book.

饶舌的人 发表于 2025-3-25 15:54:02

Oblivious Transfer and Applications.2). Oblivious transfer is one of the most important building blocks in cryptography, and is very useful for constructing secure protocols. We demonstrate this by showing how to achieve secure pseudorandom function evaluation using oblivious transfer.

dermatomyositis 发表于 2025-3-25 22:08:00

http://reply.papertrans.cn/31/3031/303003/303003_25.png

构成 发表于 2025-3-26 01:44:31

http://reply.papertrans.cn/31/3031/303003/303003_26.png

Pastry 发表于 2025-3-26 05:16:42

http://reply.papertrans.cn/31/3031/303003/303003_27.png

debouch 发表于 2025-3-26 08:53:28

http://reply.papertrans.cn/31/3031/303003/303003_28.png

LINE 发表于 2025-3-26 14:37:58

http://reply.papertrans.cn/31/3031/303003/303003_29.png

frenzy 发表于 2025-3-26 20:03:48

https://doi.org/10.1007/978-3-642-50874-5.2). Oblivious transfer is one of the most important building blocks in cryptography, and is very useful for constructing secure protocols. We demonstrate this by showing how to achieve secure pseudorandom function evaluation using oblivious transfer.
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Efficient Secure Two-Party Protocols; Techniques and Const Carmit Hazay,Yehuda Lindell Book 2010 Springer-Verlag Berlin Heidelberg 2010 Cov