|
|
Efficient Secure Two-Party Protocols
1;Preface;6
2;Contents;10
3;Part I Introduction and Definitions;13
3.1;Chapter 1 Introduction;15
3.1.1;1.1 Secure Multiparty Computation Background;15
3.1.2;1.2 The GMW Protocol for Secure Computation... |
 |
|
|
Download PDF |
Efficient Secure Two-Party Protocols |
|