Adaptively Secure Multi-party Computation
dc.contributor.author | Canetti, Ran | en_US |
dc.contributor.author | Feige, Uri | en_US |
dc.contributor.author | Goldreich, Oded | en_US |
dc.contributor.author | Naor, Moni | en_US |
dc.date.accessioned | 2023-03-29T15:26:55Z | |
dc.date.available | 2023-03-29T15:26:55Z | |
dc.date.issued | 1996-02 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/149820 | |
dc.description.abstract | A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where the channels are insecure and secur | en_US |
dc.relation.ispartofseries | MIT-LCS-TR-682 | |
dc.title | Adaptively Secure Multi-party Computation | en_US |