搜索结果: 1-2 共查到“军事学 RAM computation”相关记录2条 . 查询时间(0.062 秒)
Secure Multiparty RAM Computation in Constant Rounds
Secure computation RAM computation Garbled RAM
2016/12/10
Securing computation of a random access machine (RAM) program typically entails that it be first converted into a circuit. This conversion is unimaginable in the context of big-data applications where...
We construct the first schemes that allow a client to privately outsource arbitrary program
executions to a remote server while ensuring that: (I) the client’s work is small and essentially
independ...