搜索结果: 1-1 共查到“军队指挥学 secrecy computation”相关记录1条 . 查询时间(0.078 秒)
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
conditionally secure secret sharing secrecy computation
2017/7/28
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1. This ...