搜索结果: 1-3 共查到“军事学 LEGO”相关记录3条 . 查询时间(0.12 秒)
Faster LEGO-based Secure Computation without Homomorphic Commitments
cryptographic protocols maliciously secure two-party computation
2017/3/9
LEGO-style cut-and-choose is known for its asymptotic efficiency in realizing actively-secure computations. The dominant cost of LEGO protocols is due to wire-soldering — the key technique enabling to...
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO
Secure Two-party Computation Implementation LEGO
2016/12/7
Secure two-party computation (S2PC) allows two parties to compute a function on their
joint inputs while leaking only the output of the function. At TCC 2009 Orlandi and Nielsen proposed
the LEGO pr...
The first and still most popular solution for secure two-party computation relies
on Yao’s garbled circuits. Unfortunately, Yao’s construction provide security only against
passive adversaries. Seve...