Sciweavers

STOC
2005
ACM
112views Algorithms» more  STOC 2005»
15 years 22 days ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford