The Round Complexity of Secure Protocols
dc.contributor.advisor | Micali, Silvio | en_US |
dc.contributor.author | Rogaway, Phillip | en_US |
dc.date.accessioned | 2023-03-29T15:17:46Z | |
dc.date.available | 2023-03-29T15:17:46Z | |
dc.date.issued | 1991-04 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/149705 | |
dc.description.abstract | Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution. | en_US |
dc.relation.ispartofseries | MIT-LCS-TR-503 | |
dc.title | The Round Complexity of Secure Protocols | en_US |
dc.identifier.oclc | 23811375 |