Abstract
In this chapter, we show how to securely compute any deterministic, singleoutput non-reactive functionality in the presence of malicious adversaries. As we have shown in Section 2.5, this suffices for obtaining secure computation of any two-party probabilistic reactive functionality, with almost the same complexity.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptography |
Publisher | Springer International Publishing |
Pages | 81-108 |
Number of pages | 28 |
DOIs | |
State | Published - 2010 |
Publication series
Name | Information Security and Cryptography |
---|---|
Volume | 15 |
ISSN (Print) | 1619-7100 |
ISSN (Electronic) | 2197-845X |
Bibliographical note
Publisher Copyright:© 2010, Springer-Verlag Berlin Heidelberg.