搜索结果: 1-3 共查到“军事学 malicious security”相关记录3条 . 查询时间(0.072 秒)
Two Round Information-Theoretic MPC with Malicious Security
MPC Round-optimal Information-theoretic
2018/11/12
We provide the first constructions of two round information-theoretic (IT) secure multiparty computation (MPC) protocols in the plain model that tolerate any tmalicious corruptions. Our prot...
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
private set intersection homomorphic encryption
2018/9/6
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the intersection of their private sets without revealing extra information to each other. We are interested i...
How to Efficiently Evaluate RAM Programs with Malicious Security
secure computation oblivious ram
2016/1/7
Secure 2-party computation (2PC) is becoming practical for some applications. However, most approaches are limited by the fact that the desired functionality must be represented as a boolean circuit. ...