Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0669-z
Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a…
read more here.
Keywords:
party;
party computation;
secure two;
rational adversary ... See more keywords