Главная
Study mode:
on
1
Introduction
2
Motivation
3
Privacy
4
Twoparty security model
5
Complaint handling
6
Motivations
7
Construction
8
Communication
9
Security
10
Simulation
11
Client
12
Disclosure of Secrets
13
Making it Consistent
14
Summary
15
Questions
Description:
Explore a talk from PKC 2010 on the feasibility of consistent computations, presented by authors Sven Laur and Helger Lipmaa. Delve into topics such as privacy, two-party security models, complaint handling, and client disclosure of secrets. Learn about the motivations behind consistent computations, their construction, communication aspects, and security implications. Examine the simulation process and discover how to make computations consistent. Conclude with a summary and engage in a question-and-answer session to deepen your understanding of this cryptographic concept.

On the Feasibility of Consistent Computations

TheIACR
Add to list