搜索结果: 1-3 共查到“军队指挥学 concurrent composition”相关记录3条 . 查询时间(0.062 秒)
What Information is Leaked under Concurrent Composition?
Secure Computation Concurrent Composition
font style='font-size:12px;'>
2015/12/30
Achieving security under concurrent composition is notoriously hard. Indeed, in the plain
model, far reaching impossibility results for concurrently secure computation are known. On the
other hand, ...
How To Play Almost Any Mental Game Over The Net —Concurrent Composition via Super-Polynomial Simulation
Non-malleable protocols concurrent composition multi-party secure computation
font style='font-size:12px;'>
2009/1/23
We construct a secure protocol for any multi-party functionality that remains secure (under
a relaxed definition of security) when executed concurrently with multiple copies of itself and
other prot...
Concurrent Composition of Secure Protocols in the Timing Model
theory of cryptography secure multiparty computation concurrent composition timing assumptions
font style='font-size:12px;'>
2009/1/15
In the setting of secure multiparty computation, a set of mutually distrustful parties wish
to securely compute some joint function of their inputs. In the stand-alone case, it has been
shown that e...