Separating Two-Round Secure Computation from Oblivious Transfer

Benny Applebaum
Benny Applebaum
Akshayaram Srinivasan
Akshayaram Srinivasan

IACR Cryptology ePrint Archive, pp. 1162020.

Cited by: 2|Bibtex|Views59
EI
Other Links: dblp.uni-trier.de

Code:

Data:

Your rating :
0

 

Tags
Comments