The Round Complexity of Secure Protocols

Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.

Bibliographic Details
Main Author: Rogaway, Phillip
Other Authors: Micali, Silvio
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149705

Similar Items