搜索结果: 1-3 共查到“malicious security”相关记录3条 . 查询时间(0.062 秒)
Two Round Information-Theoretic MPC with Malicious Security
MPC Round-optimal Information-theoretic
<
2018/11/12
We provide the first constructions of two round information-theoretic (IT) secure multiparty computation (MPC) protocols in the plain model that tolerate any tmalicious corruptions. Our prot...
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
private set intersection homomorphic encryption
<
2018/9/6
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the intersection of their private sets without revealing extra information to each other. We are interested i...
How to Efficiently Evaluate RAM Programs with Malicious Security
secure computation oblivious ram
<
2016/1/7
Secure 2-party computation (2PC) is becoming practical for some applications. However, most approaches are limited by the fact that the desired functionality must be represented as a boolean circuit. ...