Advertisement

Unconditionally Secure Multiparty Computation from Noisy Resources

  • Stefan Wolf
  • Jürg Wullschleger

In this chapter, we will only look at the special case of secure function evaluation; that is, every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input.

Keywords

Signature Scheme Basic Reduction Noisy Channel Oblivious Transfer Byzantine Agreement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London Limited 2007

Authors and Affiliations

  • Stefan Wolf
    • 1
  • Jürg Wullschleger
    • 1
  1. 1.Department of Computer ScienceETH ZürichSwitzerland

Personalised recommendations