Articles with "rational adversary" as a keyword



Photo by adigold1 from unsplash

Rational adversary with flexible utility in secure two-party computation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0669-z

Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a… read more here.

Keywords: party; party computation; secure two; rational adversary ... See more keywords