Unconditionally secure multiparty computation from noisy resources

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we will only look at the special case of secure function evaluation; that is, every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input. © 2007 Springer-Verlag London.

Cite

CITATION STYLE

APA

Wolf, S., & Wullschleger, J. (2007). Unconditionally secure multiparty computation from noisy resources. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 127–139). Springer London. https://doi.org/10.1007/978-1-84628-984-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free