搜索结果: 1-2 共查到“军队指挥学 Malicious Model”相关记录2条 . 查询时间(0.062 秒)
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
privacy-enhancing technologies secure multi-party computation
2014/3/7
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols h...
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Linear-Complexity Private Intersection Protocols Secure Malicious Model
2010/9/9
Private Set Intersection (PSI) protocols allow one party (“client”) to compute an intersection of its input set with that of another party (“server”), such that the client learns nothing other than th...