搜索结果: 1-3 共查到“军事学 non-interactive secure computation”相关记录3条 . 查询时间(0.07 秒)
Reusable Non-Interactive Secure Computation
oblivious transfer oblivious linear-function evaluation non-interactive secure computation
2018/11/7
We consider the problem of Non-Interactive Secure Computation (NISC), a 2-message ``Sender-Receiver'' secure computation protocol that retains its security even when both parties can be malicious. Whi...
Non-Interactive Secure Computation from One-Way Functions
Secure Computation Hardware Tokens
2018/11/2
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al. [EUROCRYPT 2011] studies the following problem: Suppose a receiver R wishes to publish an encryptio...
Non-Interactive Secure Computation Based on Cut-and-Choose
cryptographic protocols public-key encryption
2015/12/31
In recent years, secure two-party computation (2PC) has been demonstrated to be feasible
in practice. However, all efficient general-computation 2PC protocols require multiple rounds of interaction
...