Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
© International Association for Cryptologic Research 2015. We present the first two-round, two-party general function evaluation protocol that is secure against honest-but-curious adaptive corruption of both parties. In addition, the protocol is incoercible for one of the parties, and fully leakage...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Book |
Language: | English |
Published: |
Springer Nature America, Inc
2021
|
Online Access: | https://hdl.handle.net/1721.1/136031 |