搜索结果: 1-2 共查到“密码学 MPC protocols”相关记录2条 . 查询时间(0.109 秒)
Must the Communication Graph of MPC Protocols be an Expander?
secure multiparty computation expander graph communication locality
2018/6/5
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur depen...
On Two Round Rerunnable MPC Protocols
cryptographic protocols Rerunnable Multiparty Protocols
2017/9/25
Two-rounds are minimal for all MPC protocols in the absence of a trusted PKI, however certain protocols allow the reuse of inputs for different functions, or the re-evaluation of the same function on ...