Abstract
In this chapter we summarize the contents of this book by giving general guidelines for designing efficient Secure Function Evaluation protocols in Sect. 6.1 before concluding with possible directions for future research in Sect. 6.2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Alternatively, when pre-computations are used, the GC can be buffered sequentially in secondary memory.
- 2.
Today’s high performance computing services offered by cloud providers even include high-end GPUs, e.g., [9].
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schneider, T. (2012). Conclusion. In: Engineering Secure Two-Party Computation Protocols. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30042-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-30042-4_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30041-7
Online ISBN: 978-3-642-30042-4
eBook Packages: Computer ScienceComputer Science (R0)