Hazay, Carmit
Efficient Secure Two-Party Protocols
1. Introduction
Carmit Hazay, Yehuda Lindell
2. Definitions
Carmit Hazay, Yehuda Lindell
3. Semi-honest Adversaries
Carmit Hazay, Yehuda Lindell
4. Malicious Adversaries
Carmit Hazay, Yehuda Lindell
5. Covert Adversaries
Carmit Hazay, Yehuda Lindell
6. Sigma Protocols and Efficient Zero-Knowledge
Carmit Hazay, Yehuda Lindell
7. Oblivious Transfer and Applications
Carmit Hazay, Yehuda Lindell
8. The
Carmit Hazay, Yehuda Lindell
9. Search Problems
Carmit Hazay, Yehuda Lindell
Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Computer Communication Networks, Data Mining and Knowledge Discovery
- Author(s)
- Hazay, Carmit
- Lindell, Yehuda
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Information Security and Cryptography
- Page amount
- 13 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642143038