Unconditionally Secure Multiparty Computation from Noisy Resources
In this chapter, we will only look at the special case of secure function evaluation; that is, every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input.
KeywordsSignature Scheme Basic Reduction Noisy Channel Oblivious Transfer Byzantine Agreement
Unable to display preview. Download preview PDF.