It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if - t
CITATION STYLE
Fitzi, M., Holenstein, T., & Wullschleger, J. (2004). Multi-party computation with hybrid security. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3027, 419–438. https://doi.org/10.1007/978-3-540-24676-3_25
Mendeley helps you to discover research relevant for your work.