Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
Metadata only
Date
2009Type
- Conference Paper
Publication status
publishedExternal links
Editor
Book title
Theory of cryptography : proceedingsJournal / series
Lecture Notes in Computer ScienceVolume
Pages / Article No.
Publisher
SpringerEvent
Subject
long-term security; information-theoretic security; corrupted majority; secure function evaluationMore
Show all metadata