Sovereign Information Sharing Among Malicious Partners
A secure calculation of common data R ∩S without disclosing R or S is useful for many applications and has been widely studied. However, proposed solutions assume all participants act “semi-honest”, which means participants may neither stop the protocol execution nor fake database content. In this c...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Schreiben Sie den ersten Kommentar!