The Round Complexity of Secure Protocols

Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.

Bibliographic Details
Main Author: Rogaway, Phillip
Other Authors: Micali, Silvio
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149705
_version_ 1826213230550188032
author Rogaway, Phillip
author2 Micali, Silvio
author_facet Micali, Silvio
Rogaway, Phillip
author_sort Rogaway, Phillip
collection MIT
description Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.
first_indexed 2024-09-23T15:45:31Z
id mit-1721.1/149705
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T15:45:31Z
publishDate 2023
record_format dspace
spelling mit-1721.1/1497052023-03-30T03:11:39Z The Round Complexity of Secure Protocols Rogaway, Phillip Micali, Silvio Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution. 2023-03-29T15:17:46Z 2023-03-29T15:17:46Z 1991-04 https://hdl.handle.net/1721.1/149705 23811375 MIT-LCS-TR-503 application/pdf
spellingShingle Rogaway, Phillip
The Round Complexity of Secure Protocols
title The Round Complexity of Secure Protocols
title_full The Round Complexity of Secure Protocols
title_fullStr The Round Complexity of Secure Protocols
title_full_unstemmed The Round Complexity of Secure Protocols
title_short The Round Complexity of Secure Protocols
title_sort round complexity of secure protocols
url https://hdl.handle.net/1721.1/149705
work_keys_str_mv AT rogawayphillip theroundcomplexityofsecureprotocols
AT rogawayphillip roundcomplexityofsecureprotocols