In this chapter, we will only look at the special case of secure function evaluation; that is, every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input. © 2007 Springer-Verlag London.
CITATION STYLE
Wolf, S., & Wullschleger, J. (2007). Unconditionally secure multiparty computation from noisy resources. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 127–139). Springer London. https://doi.org/10.1007/978-1-84628-984-2_8
Mendeley helps you to discover research relevant for your work.