Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretical cryptography.
Jan 7, 2014 · Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretical cryptography.
Specifically, we show that there exist symmetric functionalities (where both parties receive the same out- come), that are neither trivial nor complete under “ ...
Nov 2, 2017 · In this work, we use the notion of non-black-box reductions in the setting of symmetric secure two-party computation and consider ...
We show that there exist symmetric functionalities (where both parties receive the same outcome) that are neither trivial nor complete under black-box ...
Completeness for Symmetric Two-Party Functionalities - Revisited ...
yehudalindell.com › Publications
Completeness for Symmetric Two-Party Functionalities – Revisited. 2012; Y. Lindell, E. Omri and H. Zarosim. In ASIACRYPT 2012, Springer (LNCS 7658), pages 116 ...
Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography.
Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretical cryptography.
Completeness for symmetric two-party functionalities - Revisited. Yehuda Lindell, Eran Omri, Hila Zarosim. Department of Computer Science. Ariel University.
Fingerprint. Dive into the research topics of 'Completeness for Symmetric Two-Party Functionalities: Revisited'. Together they form a unique fingerprint.