Malicious adversaries

Carmit Hazay, Yehuda Lindell

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this chapter, we show how to securely compute any deterministic, singleoutput non-reactive functionality in the presence of malicious adversaries. As we have shown in Section 2.5, this suffices for obtaining secure computation of any two-party probabilistic reactive functionality, with almost the same complexity.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Pages81-108
Number of pages28
DOIs
StatePublished - 2010

Publication series

NameInformation Security and Cryptography
Volume15
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'Malicious adversaries'. Together they form a unique fingerprint.

Cite this