Secure multi-party computation made simple☆
Under an Elsevier user license
open archive
Keywords
Secure multi-party computation
Verifyable secret sharing
Adversary structures
Cited by (0)
- ☆
The results of this paper were first presented at the Cryptography Workshop in Luminy in September 1999, and later appeared in [20].
Copyright © 2005 Elsevier B.V. All rights reserved.