Secure Multiparty Computation
View all Sessions
Secure computation protocols with two parties and multiparties are discussed. Topic 1: Hybrid Publicly Verifiable Computation Authors: James Alderman, Christian Janson, Carlos Cid and Jason Crampton Topic 2: Efficient Concurrent Covert Computation of String Equality and Set Intersection Authors: Chongwon Cho, Dana Dachman-Soled and Stanislaw Jarecki