The Round Complexity of Secure Protocols
Author(s)
Rogaway, PhillipAbstract
Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.
Date issued
1991-04Series/Report no.
MIT-LCS-TR-503