The Round Complexity of Secure Protocols
Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.
Main Author: | |
---|---|
Other Authors: | |
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149705 |
_version_ | 1826213230550188032 |
---|---|
author | Rogaway, Phillip |
author2 | Micali, Silvio |
author_facet | Micali, Silvio Rogaway, Phillip |
author_sort | Rogaway, Phillip |
collection | MIT |
description | Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution. |
first_indexed | 2024-09-23T15:45:31Z |
id | mit-1721.1/149705 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T15:45:31Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1497052023-03-30T03:11:39Z The Round Complexity of Secure Protocols Rogaway, Phillip Micali, Silvio Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution. 2023-03-29T15:17:46Z 2023-03-29T15:17:46Z 1991-04 https://hdl.handle.net/1721.1/149705 23811375 MIT-LCS-TR-503 application/pdf |
spellingShingle | Rogaway, Phillip The Round Complexity of Secure Protocols |
title | The Round Complexity of Secure Protocols |
title_full | The Round Complexity of Secure Protocols |
title_fullStr | The Round Complexity of Secure Protocols |
title_full_unstemmed | The Round Complexity of Secure Protocols |
title_short | The Round Complexity of Secure Protocols |
title_sort | round complexity of secure protocols |
url | https://hdl.handle.net/1721.1/149705 |
work_keys_str_mv | AT rogawayphillip theroundcomplexityofsecureprotocols AT rogawayphillip roundcomplexityofsecureprotocols |