搜索结果: 1-3 共查到“军事学 Zero-One Law”相关记录3条 . 查询时间(0.165 秒)
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs
A Zero-One Law Secure Multi-Party Ternary Outputs
2011/1/12
There are protocols to privately evaluate any function in the honest-but-curious setting assuming that the honest nodes are in majority. For some specific functions, protocols are known which remain s...
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)
foundations
2012/3/30
There are protocols to privately evaluate any function in the honest-but-curious setting assuming that the honest nodes are in majority. For some specific functions, protocols are known which remain s...
A Zero-One Law for Deterministic 2-Party Secure Computation
Zero-One Law Deterministic 2-Party Secure Computation
2010/3/16
We use security in the Universal Composition framework as a means to study the \cryptographic
complexity" of 2-party secure computation tasks (functionalities). We say that a
functionality F reduces...