Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Multiparty computations

ChDG88 David Chaum, Ivan B. Damg d, Jeroen van de Graaf Multiparty Computations ensuring privacy of each party s input and correctness of the result Crypto 87, LNCS 293, Springer-Verlag, Berlin 1988, 87-119. [Pg.374]

The hope for secure quantum implementation of multiparty computations using a cryptographic primitive, called oblivious transfer [193], was dashed together with the bit commitment [186]. Until now, no other solution has been published. [Pg.573]

ChCD88 David Chaum, Claude Crepeau, Ivan Damgard Multiparty unconditional secure protocols 20th Symposium on Theory of Computing (STOC) 1988, ACM, New York 1988, 11-19. [Pg.374]


See other pages where Multiparty computations is mentioned: [Pg.493]    [Pg.566]    [Pg.573]    [Pg.76]    [Pg.493]    [Pg.566]    [Pg.573]    [Pg.76]    [Pg.153]   


SEARCH



© 2024 chempedia.info