Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer

Download Now
Provided by: Bar-Ilan University
Topic: Security
Format: PDF
In the setting of secure two-party and multiparty computation, parties with private inputs wish to securely compute some joint function of their inputs, where \"Security\" must hold in the presence of adversarial behavior by some of the parties. In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that it controls a predetermined subset of the parties) or adaptive (meaning that it can choose to corrupt parties during the protocol execution and based on what it sees).
Download Now

Find By Topic