In this chapter, we will only look at the special case of secure function evaluation; that is, every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
Wolf, S., Wullschleger, J. (2007). Unconditionally Secure Multiparty Computation from Noisy Resources. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds) Security with Noisy Data. Springer, London. https://doi.org/10.1007/978-1-84628-984-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-84628-984-2_8
Publisher Name: Springer, London
Print ISBN: 978-1-84628-983-5
Online ISBN: 978-1-84628-984-2
eBook Packages: Computer ScienceComputer Science (R0)