×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [honest parties]
Constant Round Oblivious Transfer in the Bounded-Storage Model
32 views
Survey: Secure Composition of Multiparty Protocols
34 views
Spanish Cryptography Days , November 2011 , Murcia, Spain
25 views
Private Function Evaluation
42 views
1. 2 Key Exchange Protocols A protocol between two parties to establish a shared key ( “ session key ” ) such that: 1. Authenticity: they both know who
238 views
Private Function Evaluation
33 views
Protocols for Multiparty Coin Toss With Dishonest Majority
42 views
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
56 views
< Prev