Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation

© International Association for Cryptologic Research 2015. We present the first two-round, two-party general function evaluation protocol that is secure against honest-but-curious adaptive corruption of both parties. In addition, the protocol is incoercible for one of the parties, and fully leakage...

Full description

Bibliographic Details
Main Authors: Canetti, Ran, Goldwasser, Shafi, Poburinnaya, Oxana
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Book
Language:English
Published: Springer Nature America, Inc 2021
Online Access:https://hdl.handle.net/1721.1/136031