Communication preserving protocols for secure function evaluation
- 6 July 2001
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Privacy preserving auctions and mechanism designPublished by Association for Computing Machinery (ACM) ,1999
- Oblivious transfer and polynomial evaluationPublished by Association for Computing Machinery (ACM) ,1999
- Proof verification and the hardness of approximation problemsJournal of the ACM, 1998
- On Syntactic versus Computational Views of ApproximabilitySIAM Journal on Computing, 1998
- Communication-Space Tradeoffs for Unrestricted ProtocolsSIAM Journal on Computing, 1994
- A minimal model for secure computation (extended abstract)Published by Association for Computing Machinery (ACM) ,1994
- A note on efficient zero-knowledge proofs and arguments (extended abstract)Published by Association for Computing Machinery (ACM) ,1992
- Non-cryptographic fault-tolerant computing in constant number of rounds of interactionPublished by Association for Computing Machinery (ACM) ,1989
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987