搜索结果: 1-2 共查到“军事学 MPC protocols”相关记录2条 . 查询时间(0.093 秒)
Must the Communication Graph of MPC Protocols be an Expander?
secure multiparty computation expander graph communication locality
font style='font-size:12px;'>
2018/6/5
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur depen...
On Two Round Rerunnable MPC Protocols
cryptographic protocols Rerunnable Multiparty Protocols
font style='font-size:12px;'>
2017/9/25
Two-rounds are minimal for all MPC protocols in the absence of a trusted PKI, however certain protocols allow the reuse of inputs for different functions, or the re-evaluation of the same function on ...