Secure Computation from Elastic Noisy Channels
From MaRDI portal
Publication:5739202
DOI10.1007/978-3-662-49896-5_7zbMath1369.94544OpenAlexW2500934823MaRDI QIDQ5739202
Hemanta K. Maji, Amit Sahai, Dakshita Khurana
Publication date: 15 July 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_7
information-theoretic securityoblivious transfersecure computationnoisy channelelastic noisy channelunfair noisy channel
Related Items (4)
Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement ⋮ Complete characterization of broadcast and pseudo-signatures from correlations ⋮ On perfectly secure 2PC in the OT-hybrid model ⋮ On perfectly secure 2PC in the OT-hybrid model
This page was built for publication: Secure Computation from Elastic Noisy Channels