Download Now Free registration required
In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their respective inputs securely which means that the real-life computation should be "Equivalent" to an ideal setting where the parties send inputs to a trusted party that performs the computation and returns its result. Almost independently of secure computation, the area of leakage resilient cryptography has recently been evolving intensively, studying the question of designing cryptographic primitives that remain secure even when some information about the secret key is leaked.
- Format: PDF
- Size: 308.8 KB