Sciweavers

CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
14 years 13 days ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai